Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Utilize DKIM Replay to Exploit Trusted Invoices

Hackers Utilize DKIM Replay to Exploit Trusted Invoices

Posted on February 9, 2026 By CWS

Cybersecurity threats are advancing rapidly, moving from basic phishing attempts to complex strategies that leverage trusted digital systems. Hackers are now turning to legitimate platforms like Apple and PayPal to conduct financial fraud, using these reputable services as unwitting participants in their schemes.

Exploiting Trusted Platforms

Attackers are taking advantage of standard business workflows within popular platforms to carry out their malicious activities. This shift in tactics makes it exceedingly difficult for conventional security mechanisms to detect malicious emails, as they originate from verified domains, thus putting users at greater risk of being deceived.

The strategy involves exploiting invoicing features on platforms like PayPal and Apple. Cybercriminals create genuine accounts to produce invoices or dispute notifications, embedding fraudulent contact details, such as scam phone numbers, in user-controlled fields like “seller notes.” As these messages are generated by the platforms, they are digitally signed, appearing harmless to automated filters.

Understanding DKIM Replay Attacks

Security analysts at Kaseya have identified a malware campaign that exploits the trust users place in familiar brand notifications. This underscores a significant vulnerability in email security, where authentication protocols verify the sender’s identity but fail to ensure the content’s integrity.

The technique, known as a DKIM replay attack, manipulates email authentication protocols to validate the sender. Hackers first send a malicious invoice to themselves, ensuring it receives a valid DomainKeys Identified Mail (DKIM) signature. They then forward this email to numerous potential victims, bypassing traditional security checks.

The original cryptographic signature remains intact even when the email is forwarded, allowing it to pass Domain-based Message Authentication, Reporting, and Conformance (DMARC) checks and reach the victim’s inbox. The recipient sees a legitimate-looking email from addresses like “service@paypal[.]com,” yet it directs them to contact a fraudulent number to extract sensitive information.

Preventive Measures and User Awareness

To combat these threats, security teams should adjust email gateways to inspect the “To” header for any discrepancies between the envelope recipient and the visible header. It is also crucial for organizations to educate their users to be wary of unexpected invoices and to verify any claims by logging into official portals directly, rather than relying on contact numbers provided in emails.

Staying informed and vigilant is key to protecting against such sophisticated cyber threats. Organizations and individuals alike must adopt robust security practices and remain cautious of unsolicited digital communications.

Cyber Security News Tags:Apple, Cybersecurity, digital signatures, DKIM replay, email authentication, email security, fraud prevention, Malware, PayPal, Phishing

Post navigation

Previous Post: Ransomware Groups May Shift Back to Encryption Strategies
Next Post: Major Cybersecurity M&A Deals in January 2026

Related Posts

Microsoft Unveils Advanced Copilot for Outlook Management Microsoft Unveils Advanced Copilot for Outlook Management Cyber Security News
Engineering’s Role in AI Development Engineering’s Role in AI Development Cyber Security News
KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique Cyber Security News
CISA Urges Action on Windows ActiveX RCE Flaw CISA Urges Action on Windows ActiveX RCE Flaw Cyber Security News
New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER Cyber Security News
AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark