Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Utilize DKIM Replay to Exploit Trusted Invoices

Hackers Utilize DKIM Replay to Exploit Trusted Invoices

Posted on February 9, 2026 By CWS

Cybersecurity threats are advancing rapidly, moving from basic phishing attempts to complex strategies that leverage trusted digital systems. Hackers are now turning to legitimate platforms like Apple and PayPal to conduct financial fraud, using these reputable services as unwitting participants in their schemes.

Exploiting Trusted Platforms

Attackers are taking advantage of standard business workflows within popular platforms to carry out their malicious activities. This shift in tactics makes it exceedingly difficult for conventional security mechanisms to detect malicious emails, as they originate from verified domains, thus putting users at greater risk of being deceived.

The strategy involves exploiting invoicing features on platforms like PayPal and Apple. Cybercriminals create genuine accounts to produce invoices or dispute notifications, embedding fraudulent contact details, such as scam phone numbers, in user-controlled fields like “seller notes.” As these messages are generated by the platforms, they are digitally signed, appearing harmless to automated filters.

Understanding DKIM Replay Attacks

Security analysts at Kaseya have identified a malware campaign that exploits the trust users place in familiar brand notifications. This underscores a significant vulnerability in email security, where authentication protocols verify the sender’s identity but fail to ensure the content’s integrity.

The technique, known as a DKIM replay attack, manipulates email authentication protocols to validate the sender. Hackers first send a malicious invoice to themselves, ensuring it receives a valid DomainKeys Identified Mail (DKIM) signature. They then forward this email to numerous potential victims, bypassing traditional security checks.

The original cryptographic signature remains intact even when the email is forwarded, allowing it to pass Domain-based Message Authentication, Reporting, and Conformance (DMARC) checks and reach the victim’s inbox. The recipient sees a legitimate-looking email from addresses like “service@paypal[.]com,” yet it directs them to contact a fraudulent number to extract sensitive information.

Preventive Measures and User Awareness

To combat these threats, security teams should adjust email gateways to inspect the “To” header for any discrepancies between the envelope recipient and the visible header. It is also crucial for organizations to educate their users to be wary of unexpected invoices and to verify any claims by logging into official portals directly, rather than relying on contact numbers provided in emails.

Staying informed and vigilant is key to protecting against such sophisticated cyber threats. Organizations and individuals alike must adopt robust security practices and remain cautious of unsolicited digital communications.

Cyber Security News Tags:Apple, Cybersecurity, digital signatures, DKIM replay, email authentication, email security, fraud prevention, Malware, PayPal, Phishing

Post navigation

Previous Post: Ransomware Groups May Shift Back to Encryption Strategies
Next Post: Major Cybersecurity M&A Deals in January 2026

Related Posts

Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July Cyber Security News
How Prompt Injection Attacks Bypassing AI Agents With Users Input How Prompt Injection Attacks Bypassing AI Agents With Users Input Cyber Security News
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Cyber Security News
NCSC Warns of Hacktivist Groups Attacking UK Organisations and Online Services NCSC Warns of Hacktivist Groups Attacking UK Organisations and Online Services Cyber Security News
Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity Cyber Security News
Mysterious Elephant APT Hackers Infiltrate Organization to Steal Sensitive Information Mysterious Elephant APT Hackers Infiltrate Organization to Steal Sensitive Information Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News