A flaw in Proofpoint’s anti-phishing platform allowed a hacker to send millions of spam emails
The attacker was able to manufacture fully authenticated spam emails addressed from Proofpoint customers


Phishing campaigns were undertaken by a malicious actor through an exploited configuration of Proofpoint’s anti-phishing platform, allowing a malicious actor to send spam emails according to the firm.
Dubbed “EchoSpoofing,” a report from Guardio Labs estimated that cyber criminals could have sent an approximate daily average of three million emails a day - with peak daily numbers reaching as high as 14 million - though Proofpoint maintained that the campaigns were undertaken by “one spam actor.”
Guardio’s research revealed that these fake emails appeared in customer inboxes from big-name Proofpoint clients such as Disney and Coca-Cola and were “properly signed and authenticated” with legitimate Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) signatures.
Proofpoint’s platform was labeled as the “enabler” of this campaign in the report, with the fake emails all dispatched to target customers from domain-specific Proofpoint servers.
The cybersecurity firm noted, however, that “any email infrastructure” offering the same email routing configuration could be targeted and abused by spammers.
Guardio - with whom Proofpoint has been collaborating on the response - said Proofpoint assigns outgoing emails from a company with SPF and DKIM authentications.
The prospective cyber criminal then only needs to “find a way to send spoofed emails through the Proofpoint relay, and Proofpoint will do all the rest.”
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“The root cause is a modifiable email routing configuration feature on Proofpoint servers to allow relay of organizations’ outbound messages from Microsoft 365 tenants, but without specifying which M365 tenants to allow,” Proofpoint’s Threat Research Team said.
Proofpoint flaw enabled rapid-fire malicious email spamming
As part of the spam campaign, the attacker created fake emails before initiating “quick bursts of thousands of messages” at a time to Microsoft 365 to be “relayed to Proofpoint-hosted customer servers.”
Microsoft 365 then accepted these “spoofed messages,”, before sending them to customers’ email infrastructures to be relayed.
“When customer domains were spoofed while relaying through the matching customer’s email infrastructure, DKIM signing was also applied as the messages transited through the Proofpoint infrastructure, making the spam messages more deliverable,” Proofpoint said.
“This specific email routing configuration abused by the spammer allowed outbound messages to be sent from a customer’s Microsoft 365 tenant for relay through their infrastructure, but it did not limit the Microsoft tenants allowed to relay,” the firm added.
RELATED WHITEPAPER
The routing configuration utilized by the spammer allowed outbound messages to be sent from customers’ Microsoft 365 tenants for relay, though there was no limit on the tenants allowed to relay.
From Proofpoint, the email is “echoed” back to customers as what appears to be an entirely genuine email, hence the term “EchoSpoofing” according to Guardio.
“The attacker exploits this super-permissive misconfiguration flaw, adding it to the blind relay on the Office365 instance to generate any spoofed email, deliver it to Proofpoint’s servers, and have it accepted and processed,” Nati Tal, Head of Guardio Labs, said.
In an effort to resolve the issue, Proofpoint deployed a “streamlined administrative interface” so that its customers could specify what emails were allowed to relay with more clarity.
Proofpoint added that its ‘Essentials’ customers are not affected as their configuration settings are already set to prevent “unauthorized relay abuse.” Similarly, the firm stated that no customer data was either lost or exposed as a result of the issue.

George Fitzmaurice is a former Staff Writer at ITPro and ChannelPro, with a particular interest in AI regulation, data legislation, and market development. After graduating from the University of Oxford with a degree in English Language and Literature, he undertook an internship at the New Statesman before starting at ITPro. Outside of the office, George is both an aspiring musician and an avid reader.
-
OpenAI just launched 'Codex', a new AI agent for software engineering
News OpenAI has unveiled the launch of a new AI agent, dubbed 'Codex', aimed specifically at supporting software engineering tasks.
-
Acer's new Swift Edge 14 AI is a Copilot+ MacBook Air killer
News Acer's new Swift Edge 14 AI is an ultra-lightweight, compact productivity powerhouse.
-
Securing your business with education and training
ITPro Podcast Keeping your workforce updated on the latest threats requires a cohesive cyber skills strategy
-
Proofpoint and CyberArk expand strategic partnership
News The collaboration includes a new ZenWeb browser extension to protect employees from malicious URLs
-
Alert issued for ‘Voldemort’ malware as dozens of organizations hit
News Proofpoint researchers say the Voldemort malware campaign appears to be aimed at cyber espionage
-
Advanced email security
Whitepaper Protect against advanced email threats, streamline operations, and get actionable visibility into people risk and your threat landscape
-
Metrics that matter
Whitepaper The CISO’s guide to assessing, prioritizing, and justifying cybersecurity budgets that make business sense
-
The cost of ‘good enough’ security
Whitepaper Calculating the true value of cybersecurity solutions
-
Turning the tables
Whitepaper How smart email reporting and remediation can transform attackers’ favourite targets into your best defence
-
Cloud in the crosshairs
Whitepaper How cyber criminals exploit file-sharing, identity, and supply chain vulnerabilities in Microsoft 365