This content is viewable by Everyone

Apr 2025: PROOFPOINT IMPERSONATION

Proofpoint Imposter phish indicators

Threat Alert: PROOFPOINT IMPERSONATION

  • The threat is a Phishing-as-a-Service (PhaaS) platform that specializes in stealing Microsoft 365 login credentials, user cookies, Microsoft 365 data, and system information.
  • Information collected enables attackers to bypass MFA protections, which can lead to account compromise, even on many systems protected by multifactor authentication.
  • The threat can also mimic a company’s branding to create a more convincing authentication page.

How is it used in the wild?

  • Threat actors used a PhaaS platform to impersonate Proofpoint, sending emails that looked like security account notifications.
  • Example subject lines included:
    • Compliance Reminder: Monthly Activity Verification On [date]
    • Administrative Alert: Basic Routine Check Report Available on [date]
    • Administrative Alert: Account Activity Report Available on [date]
  • The messages had attachments that, when opened, led the user to a fake Microsoft 365 login page via a Cloudflare verification.
  • The login page featured the organization’s branding while collecting the user’s credentials, 2FA token, and session cookie.
  • The information gathered could lead to account compromise.

Key Action: Stay Alert!

  • Cybercriminals regularly mimic legitimate services like Proofpoint. Cybercriminals impersonate legitimate services to gain credibility.
  • Check emails carefully, paying attention to the URL, sender, subject, and attachments. Be wary of URLs that push you to external sites for "authentication.”
  • Remain alert to phishing indicators. Mismatches between sending addresses and an organization’s name are always warning signs.
  • Report ANY suspicious emails via Phish Alarm.