-
Notifications
You must be signed in to change notification settings - Fork 104
Description
This issue proposes adding a new SaaS attack technique that exploits common email functionality in SaaS applications to conduct social engineering attacks. The technique leverages legitimate email features, particularly customizable email templates, to send convincing phishing emails or fraudulent communications that appear to originate from trusted SaaS platforms.
Technique Name
SaaS Email Infrastructure Hijacking
Description
Many SaaS applications include features that allow users to trigger email notifications to internal or external recipients. These features often include:
- Email notifications for sharing documents, invitations, or updates
- Customizable email templates with user-controlled content
- Automated email workflows and triggers
- Contact forms or messaging systems that generate emails
Attackers can abuse these legitimate features to conduct social engineering attacks by:
- Crafting malicious content within email templates or message fields
- Leveraging the SaaS platform's reputation and domain authority
- Bypassing traditional email security controls that trust communications from legitimate SaaS providers
- Creating convincing phishing campaigns that appear to originate from trusted business applications
Technical Details
Prerequisites
- Valid account on target SaaS platform
- Access to email functionality within the application
- Ability to customize email content (templates, messages, or subject lines)
Attack Vectors
- Template Customization: Modifying email templates to include malicious links, credential harvesting forms, or social engineering content
- Recipient Manipulation: Using legitimate email features to send to external recipients while controlling the message content
- Domain Spoofing: Leveraging the SaaS platform's legitimate domain and infrastructure to bypass email security
- Brand Impersonation: Crafting messages that appear to be official communications from the SaaS provider or organization
Example Attack Flow
- Attacker gains access to SaaS application (through compromised credentials, social engineering, etc.)
- Identifies email functionality that allows custom content
- Crafts malicious email template or message content
- Triggers email delivery to target recipients
- Recipients receive emails from legitimate SaaS domain with malicious content
- Victims are more likely to trust and interact with the content due to the legitimate sender
Real-World Example
The technique has been demonstrated in practice with Zendesk infrastructure being abused for phishing and pig butchering activities, as documented in this CloudSEK research. Attackers used Zendesk's email functionality to send convincing phishing emails that bypassed traditional email security measures.