A scam campaign linked to an unknown threat actor is using an email routing misconfiguration in Proofpoint’s defenses to send millions of fake emails pretending to be from companies like Best Buy, IBM, Nike, and Walt Disney. Guardio Labs named the campaign EchoSpoofing.
It started in January 2024. The threat actor took advantage of a loophole and sent around three million emails per day on average. In early June, the number of emails reached a peak of 14 million as the company Proofpoint started to take action against it.
By infosecbulletin
/ Sunday , July 20 2025
Hewlett-Packard Enterprise (HPE) warns that Aruba Instant On Access Points have hardcoded credentials, enabling attackers to skip normal authentication and...
Read More
By infosecbulletin
/ Sunday , July 20 2025
The Akira ransomware group increased its attacks, adding 12 new victims to its dark web portal from July 15 to...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Defence Minister Chan Chun Sing said these select units will work with the Cyber Security Agency (CSA) in a united...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Google is suing 25 unidentified cybercriminals thought to be from China for running BADBOX 2.0, a major global botnet with...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Oracle's July 2025 Critical Patch Update includes 309 new security patches, with 127 addressing remotely exploitable vulnerabilities. SecurityWeek found about...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Cybersecurity researchers have revealed a new malware named MDifyLoader, linked to cyber attacks using security vulnerabilities in Ivanti Connect Secure...
Read More
By infosecbulletin
/ Saturday , July 19 2025
U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a crucial vulnerability in Fortinet FortiWeb in its Known Exploited Vulnerabilities...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Security researcher Jeremiah Fowler discovered an online database exposing sensitive information from an adoption agency. Jeremiah Fowler Jeremiah specializes in...
Read More
By infosecbulletin
/ Friday , July 18 2025
A critical vulnerability in Cisco Identity Services Engine (ISE) and Cisco ISE-PIC, identified as CVE-2025-20337, has a CVSS score of...
Read More
By infosecbulletin
/ Thursday , July 17 2025
On Tuesday, Bangladesh Bank organized a special award ceremony at its headquarters in Dhaka to formally recognize and honor a...
Read More
The Hacker News reported “These emails echoed from official Proofpoint email relays with authenticated SPF and DKIM signatures, thus bypassing major security protections — all to deceive recipients and steal funds and credit card details,”.
“The most unique and powerful part of this domain is the spoofing method – leaving almost no chance to realize this is not a genuine email sent from those companies,” Guardio Labs researcher Nati Tal told.
“This EchoSpoofing concept is really powerful. It’s kind of strange it is being used for large-scale phishing like this instead of a boutique spear-phishing campaign – where an attacker can swiftly take any real company team member’s identity and send emails to other co-workers – eventually, through high-quality social engineering, get access to internal data or credentials and even compromise the entire company.
The technique utilizes an SMTP server on a virtual private server (VPS) to send messages, ensuring compliance with authentication and security measures like SPF and DKIM. Click here to read the full report.