In January 2024, an unknown threat actor launched a massive scam campaign known as EchoSpoofing, exploiting a misconfiguration in Proofpoint's email security defenses. This exploit allowed the attacker to send millions of spoofed emails from well-known companies like Best Buy, IBM, Nike, and Walt Disney to name a few. This led to significant security challenges for these companies and became an eye-opener for mailbox and email service providers alike.
Proofpoint, a renowned email security vendor, had a critical misconfiguration in its email routing setup. This flaw allowed malicious actors to relay emails through Proofpoint's infrastructure, making them appear as genuine emails from legitimate companies. The attacker leveraged this vulnerability to send emails with authenticated SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) signatures, which are typically used to prevent email spoofing.
The EchoSpoofing campaign began in January 2024 and rapidly scaled, sending up to three million emails per day, with a peak of 14 million in early June as Proofpoint started to implement countermeasures. These spoofed emails bypassed major security protections, deceiving recipients into believing they were from trusted sources, ultimately aiming to steal funds and credit card details. The most unique aspect of this attack was the spoofing method, which left almost no indication that the emails were not genuine.
Traditionally, email spoofing involves forging the "FROM" header to make an email appear as though it is sent from a trusted domain. Modern email security protocols like SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) require emails to be sent from approved servers and authenticated with a private DKIM key, making simple spoofing more difficult.
Proofpoint provides email security services by acting as an intermediary relay server for its clients, managing both incoming and outgoing emails. Customers configure their SPF records to approve Proofpoint's servers and provide their DKIM keys to Proofpoint for email signing.
PowerMTA was the backend used by scammers for the EchoSpoofing attack, highlighting the unfortunate reality that many cracked versions of PowerMTA are widely distributed and abused. As with any software that is not well-maintained, PowerMTA has become outdated and is increasingly exploited, making it a prime example of how neglected software can be misused in malicious operations.
Vulnerability exploitation
Proofpoint’s default configuration allows any Office365 account to relay emails through its servers, without distinguishing between legitimate and malicious sources. This configuration is highly permissive and exploitable.
Attackers used publicly available DNS records to identify the specific Proofpoint relay servers used by a brand. They configure their Exchange Online Server to use these specific relay servers, completing the delivery chain for spoofed emails.
» host -t mx disney.com
disney.com mail is handled by 10 mxa-00278502.gslb.pphosted.com.
disney.com mail is handled by 10 mxb-00278502.gslb.pphosted.com.
As the threats advance in sophistication, the email world needs stringent and advanced measures to handle them. EchoSpoofing exposed a few vulnerabilities in some prominent email software, but this also allows us to do a thorough review of email configurations and to keep them secure.
Here's to building a safer and more resilient email ecosystem!