Thanks for this Hans-Martin,

This was definitely phish. Compromised account. The account was actioned
very quickly after the mail got out.

For what it's worth, 2FA *is* required now but as you probably know it is
not a silver bullet for preventing abuse. When customers expose their API
key(s) to the open web, stuff happens.

Luke

On Thu, Jul 8, 2021 at 10:46 PM Hans-Martin Mosner via mailop <
mailop@mailop.org> wrote:

> Am 08.07.21 um 18:14 schrieb Luke via mailop:
> > Just so the group is aware, our team is looking into the Zoom traffic.
> We aren't sure what they are doing with that
> > mail stream, but it doesn't look good.
> >
> > Both of the accounts reported by Michael have been suspended.
> >
> > Thanks, everyone.
> >
> > Luke
> >
> I have a hunch that some time ago (just before the increased spam via
> SendGrid started) there might have been an
> unauthorized access to SendGrid customer data which allowed hackers to
> bruteforce hashed passwords and use valid
> accounts to send spam and fraudulent/phishing mails. The pattern is too
> strong to be reasonably explained with singular
> security breaches at individual customers.
>
> SendGrid, if this comes close to the truth (I can only guess), please be
> open about it at least in communication to your
> customers. If possible, enforce 2FA, watch for logins from unusual IP
> addresses, etc. Maybe a complete password reset
> for all customers would be in order.
>
> Repealing spam and fraud from completely bogus sources is a lot of work
> for us mail admins already, but when it comes
> from presumably authentic sources it becomes incredibly difficult and
> prone to false positives.
>
> Here's a simple example: I have a mail sample in quarantine that comes
> from "topbuildersolutions.net", apparently a
> SendGrid customer, using your outgoing infrastructure (192.254.122.201),
> so it's not a simple impersonation. It purports
> to be a payment reminder, with the usual phishing drill of urgency by
> threatening account termination. With a From: line
> of "SendGrid <notificat...@topbuildersolutions.net>", a SendGrid logo as
> embedded png, closing line "The Billing
> Operations Team at SendGrid" it looks 100% like phishing to me.
>
> Is this from you actually?
> If yes, why do you send out payment reminders using foreign domains?
> If not, why do you let your customers send such mails through your system?
>
> Your reputation is going down the drain. You should definitely realize
> that your reputation is your most valuable asset,
> and it's losing value at an incredible rate.
>
> Cheers,
> Hans-Martin
>
> _______________________________________________
> mailop mailing list
> mailop@mailop.org
> https://list.mailop.org/listinfo/mailop
>
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to