Proofpoint's Email Protection Service Exploited to Send Millions of Phishing Emails
Proofpoint’s Electronic mail Protection Carrier Exploited to Ship Hundreds and thousands of Phishing Emails
A wide phishing campaign dubbed “EchoSpoofing” has exploited a significant vulnerability in Proofpoint’s email protection service, allowing cybercriminals to ship thousands and thousands of completely spoofed phishing emails impersonating significant brands.
The exploit, uncovered by cybersecurity firm Guardio Labs, affected Proofpoint’s system outdated by 87 of the Fortune 100 companies.
This wide scale of the attack now not simplest posed a substantial threat to significant companies and their reputations but additionally highlighted the vulnerabilities in present email security protocols.
The fine attack leveraged Proofpoint’s infrastructure to dispatch emails that regarded as if it would possibly maybe per chance maybe maybe presumably advance from famed companies similar to Disney, IBM, Nike, Simplest Aquire, and Coca-Cola.
These groundless messages bypassed significant security protections by utilizing authenticated SPF and DKIM signatures, making them indistinguishable from respectable communications.

Nati Tal, Head of Guardio Labs, defined, “This flaw can with out problems transition from fashioned phishing to focused spear-phishing assaults, allowing an assailant to mercurial impersonate any respectable worker and ship spurious emails to colleagues.”
The exploit took merit of rather a lot of vulnerabilities, together with a permissive configuration in Proofpoint’s system that allowed emails from any Office365 narrative to be relayed thru their servers. Cybercriminals outdated clusters of Virtual Inner most Servers (VPS) and a high-efficiency email shipping application called PowerMTA to orchestrate the campaign.

The attack campaign started in January 2024, sending an average of two-3 million emails daily. At its high in early June, the operation dispatched up to 14 million malicious emails per day whereas masquerading as Disney. Guardio Labs estimates that approximately 360 million phishing emails were despatched using this methodology over 180 days.
Upon discovery, Guardio Labs collaborated with Proofpoint to address the vulnerability. Proofpoint has since updated its admin panel to enhance the default configuration task, alerting customers about skill risks and enabling them to approve explicit tenants.
Proofpoint implemented a mitigation technique using the uncommon dealer-explicit header X-OriginatorOrg. This header, robotically appended by Exchange servers, contains the distinct Office365 narrative title or “tenant,” allowing for respectable verification of email sources.
Proofpoint ensured that any spoofed X-OriginatorOrg headers were stripped from outgoing emails, adding an additional layer of security to the mitigation formula.
Whereas the amount of assaults has vastly decreased for the reason that discovery, with the closing significant batch of spoofed emails despatched on July 22, the incident serves as a stark reminder of the evolving nature of cyber threats and the importance of robust email security features.
Source credit : cybersecuritynews.com