Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Utilize DKIM Replay to Exploit Trusted Invoices

Hackers Utilize DKIM Replay to Exploit Trusted Invoices

Posted on February 9, 2026 By CWS

Cybersecurity threats are advancing rapidly, moving from basic phishing attempts to complex strategies that leverage trusted digital systems. Hackers are now turning to legitimate platforms like Apple and PayPal to conduct financial fraud, using these reputable services as unwitting participants in their schemes.

Exploiting Trusted Platforms

Attackers are taking advantage of standard business workflows within popular platforms to carry out their malicious activities. This shift in tactics makes it exceedingly difficult for conventional security mechanisms to detect malicious emails, as they originate from verified domains, thus putting users at greater risk of being deceived.

The strategy involves exploiting invoicing features on platforms like PayPal and Apple. Cybercriminals create genuine accounts to produce invoices or dispute notifications, embedding fraudulent contact details, such as scam phone numbers, in user-controlled fields like “seller notes.” As these messages are generated by the platforms, they are digitally signed, appearing harmless to automated filters.

Understanding DKIM Replay Attacks

Security analysts at Kaseya have identified a malware campaign that exploits the trust users place in familiar brand notifications. This underscores a significant vulnerability in email security, where authentication protocols verify the sender’s identity but fail to ensure the content’s integrity.

The technique, known as a DKIM replay attack, manipulates email authentication protocols to validate the sender. Hackers first send a malicious invoice to themselves, ensuring it receives a valid DomainKeys Identified Mail (DKIM) signature. They then forward this email to numerous potential victims, bypassing traditional security checks.

The original cryptographic signature remains intact even when the email is forwarded, allowing it to pass Domain-based Message Authentication, Reporting, and Conformance (DMARC) checks and reach the victim’s inbox. The recipient sees a legitimate-looking email from addresses like “service@paypal[.]com,” yet it directs them to contact a fraudulent number to extract sensitive information.

Preventive Measures and User Awareness

To combat these threats, security teams should adjust email gateways to inspect the “To” header for any discrepancies between the envelope recipient and the visible header. It is also crucial for organizations to educate their users to be wary of unexpected invoices and to verify any claims by logging into official portals directly, rather than relying on contact numbers provided in emails.

Staying informed and vigilant is key to protecting against such sophisticated cyber threats. Organizations and individuals alike must adopt robust security practices and remain cautious of unsolicited digital communications.

Cyber Security News Tags:Apple, Cybersecurity, digital signatures, DKIM replay, email authentication, email security, fraud prevention, Malware, PayPal, Phishing

Post navigation

Previous Post: Ransomware Groups May Shift Back to Encryption Strategies
Next Post: Major Cybersecurity M&A Deals in January 2026

Related Posts

Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Cyber Security News
Threat Actors Leverage Google Apps Script To Host Phishing Websites Threat Actors Leverage Google Apps Script To Host Phishing Websites Cyber Security News
Stellantis, the Maker of Citroën, FIAT, Jeep, and Other Cars, Confirms Data Breach Stellantis, the Maker of Citroën, FIAT, Jeep, and Other Cars, Confirms Data Breach Cyber Security News
Dark Web Travel Agencies Offering Cheap Travel Deals to Steal Credit Card Data Dark Web Travel Agencies Offering Cheap Travel Deals to Steal Credit Card Data Cyber Security News
800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks 800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks Cyber Security News
Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Criminal IP Boosts IBM QRadar with Real-Time Threat Data
  • Ransomware Attack Exploits SmarterMail Vulnerability
  • SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks
  • Discord Introduces Age-Restricted Features for Safer Use
  • Major Cybersecurity M&A Deals in January 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Criminal IP Boosts IBM QRadar with Real-Time Threat Data
  • Ransomware Attack Exploits SmarterMail Vulnerability
  • SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks
  • Discord Introduces Age-Restricted Features for Safer Use
  • Major Cybersecurity M&A Deals in January 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark