Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Utilize DKIM Replay to Exploit Trusted Invoices

Hackers Utilize DKIM Replay to Exploit Trusted Invoices

Posted on February 9, 2026 By CWS

Cybersecurity threats are advancing rapidly, moving from basic phishing attempts to complex strategies that leverage trusted digital systems. Hackers are now turning to legitimate platforms like Apple and PayPal to conduct financial fraud, using these reputable services as unwitting participants in their schemes.

Exploiting Trusted Platforms

Attackers are taking advantage of standard business workflows within popular platforms to carry out their malicious activities. This shift in tactics makes it exceedingly difficult for conventional security mechanisms to detect malicious emails, as they originate from verified domains, thus putting users at greater risk of being deceived.

The strategy involves exploiting invoicing features on platforms like PayPal and Apple. Cybercriminals create genuine accounts to produce invoices or dispute notifications, embedding fraudulent contact details, such as scam phone numbers, in user-controlled fields like “seller notes.” As these messages are generated by the platforms, they are digitally signed, appearing harmless to automated filters.

Understanding DKIM Replay Attacks

Security analysts at Kaseya have identified a malware campaign that exploits the trust users place in familiar brand notifications. This underscores a significant vulnerability in email security, where authentication protocols verify the sender’s identity but fail to ensure the content’s integrity.

The technique, known as a DKIM replay attack, manipulates email authentication protocols to validate the sender. Hackers first send a malicious invoice to themselves, ensuring it receives a valid DomainKeys Identified Mail (DKIM) signature. They then forward this email to numerous potential victims, bypassing traditional security checks.

The original cryptographic signature remains intact even when the email is forwarded, allowing it to pass Domain-based Message Authentication, Reporting, and Conformance (DMARC) checks and reach the victim’s inbox. The recipient sees a legitimate-looking email from addresses like “service@paypal[.]com,” yet it directs them to contact a fraudulent number to extract sensitive information.

Preventive Measures and User Awareness

To combat these threats, security teams should adjust email gateways to inspect the “To” header for any discrepancies between the envelope recipient and the visible header. It is also crucial for organizations to educate their users to be wary of unexpected invoices and to verify any claims by logging into official portals directly, rather than relying on contact numbers provided in emails.

Staying informed and vigilant is key to protecting against such sophisticated cyber threats. Organizations and individuals alike must adopt robust security practices and remain cautious of unsolicited digital communications.

Cyber Security News Tags:Apple, Cybersecurity, digital signatures, DKIM replay, email authentication, email security, fraud prevention, Malware, PayPal, Phishing

Post navigation

Previous Post: Ransomware Groups May Shift Back to Encryption Strategies
Next Post: Major Cybersecurity M&A Deals in January 2026

Related Posts

CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025 CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025 Cyber Security News
New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182) New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182) Cyber Security News
Microsoft Patched Windows Server 2025 Restart Bug Disconnects AD Domain Controller Microsoft Patched Windows Server 2025 Restart Bug Disconnects AD Domain Controller Cyber Security News
Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families Cyber Security News
Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains Cyber Security News
New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark