WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – Exploitation of Proofpoint’s Email Protection Enables Widespread Impersonation of Well-Known Brands
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Exploitation of Proofpoint’s Email Protection Enables Widespread Impersonation of Well-Known Brands

Author: Chase Snow

Created: Tuesday, July 30, 2024 - 18:40

Categories: Cybersecurity, Security Preparedness

A misconfiguration in Proofpoint’s email security system allows threat actors to send seemingly genuine emails without detection. This campaign, which has been active since January 2024, leverages well-known companies by spoofing their emails and circumventing major security protections, such as SPF and DKIM signatures. WaterISAC is sharing for security awareness as the exploit of Proofpoint’s email protections enables the widespread impersonation of well-known brands.

The scale of the operation is staggering, with an average of three million spoofed emails sent per day, reaching a peak of 14 million in June 2024. These phishing emails are able to impersonate legitimate company domains, making them nearly indistinguishable from authentic communications.

The underlying issue stems from what is being called a “super-permissive misconfiguration flaw” in Proofpoint’s email servers, which allowed rogue Microsoft 365 tenants to relay fraudulent messages through the email infrastructures of Proofpoint’s customers. This enables the attacker to send seemingly genuine emails without detection, making even the most security aware user susceptible to this attack.

While Proofpoint has acknowledged the ongoing campaign and noted that it does not align with any known threat actor, they have implemented measures to mitigate the issue, such as restricting which Microsoft 365 tenants can relay emails. The incident underscores the necessity for organizations to maintain strict oversight of third-party email services and implement robust controls to safeguard against spoofing attacks. For more information on the ongoing phishing campaign, visit BleepingComputer or TheHackerNews.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar