A Woodworking Class Receipt That Nobody Signed Up For: Bounce Tokens as Mailbox Recon

TL;DR A fully authenticated Acuity Scheduling payment receipt for a Canadian woodworking class landed in an ad-tech employee's inbox. SPF, DKIM, and DMARC all passed under a REJECT enforcement policy. The email contained zero malicious links, zero attachments, and zero credential requests. Its real payload was invisible: a VERP-encoded bounce token embedding the recipient address directly in the Return-Path and an HTTP open-tracking pixel confirming message renders. Together, these two mechanisms silently confirm mailbox existence and active engagement, building a validated target list for future credential harvesting or BEC campaigns.
Severity: Medium Reconnaissance Phishing-For-Information MITRE: T1598 MITRE: T1589.002

A bilingual payment receipt for a Canadian woodworking class landed in an employee's inbox at a digital advertising firm. The subject line: "Reçu de paiement / Payment confirmation." The body showed a 180-minute woodworking workshop booking, a $113.83 CAD subtotal, a $100 gift voucher discount, and a final charge of $13.83 CAD. The branding, layout, and formatting were pixel-perfect Acuity Scheduling. SPF passed. DKIM passed. DMARC passed under a REJECT enforcement policy. There were no attachments. No clickable links in the body. No credential form.

Nobody at this company signed up for a woodworking class in Montreal.

The email contained exactly two things worth paying attention to, and neither was visible to the recipient: a VERP-encoded bounce token in the Return-Path and an HTTP open-tracking pixel in the message body. Together, they form a silent mailbox validation system that confirms whether the recipient address is live, whether the mailbox renders external resources, and exactly when the message was opened.

Anatomy of a Zero-Payload Recon Message

The email originated from scheduling@acuityscheduling-mail[.]com with display name "Les Affûtés," a real woodworking studio in Montreal. It was sent through Acuity Scheduling infrastructure (owned by Squarespace) and relayed via SendGrid at IP 198[.]21[.]4[.]208, resolving to o9.ptr858.acuityscheduling-mail[.]com.

The authentication chain was spotless:

  • SPF: Pass (198[.]21[.]4[.]208 designated as permitted sender for acuityscheduling-mail[.]com)
  • DKIM: Pass (selector s1, domain acuityscheduling-mail[.]com)
  • DMARC: Pass (policy p=REJECT, sp=REJECT, disposition=NONE)
  • ARC: Intact chain through Google MX

WHOIS for acuityscheduling-mail[.]com shows registration through MarkMonitor with Squarespace, Inc. as the registrant, created 2024-01-23. This is not a lookalike domain or a compromised relay. It is the legitimate sending domain for Acuity Scheduling transactional emails. That is what makes this case instructive.

The Bounce Token: Confirming Mailboxes Without a Click

The Return-Path header contained: bounces+55675-2363-{recipient}={domain}[.]com@em582.acuityscheduling-mail[.]com

This is a VERP (Variable Envelope Return Path) encoding. The recipient's full email address is embedded directly in the bounce address, with the @ symbol replaced by =. In this case, the employee's username and corporate domain appeared verbatim in the Return-Path. If the target mailbox does not exist, the resulting Non-Delivery Report routes back to a sender-controlled bounce address that identifies the exact failed recipient. If no bounce comes back, the address is confirmed live.

This technique requires zero interaction from the recipient. The mailbox validation happens at the SMTP layer before the email is even rendered. A threat actor who sends 10,000 of these receipts through a legitimate scheduling platform gets a validated target list back purely from bounce and non-bounce responses.

See Your Risk: Calculate how many threats your SEG is missing

The Tracking Pixel: Confirming Engagement

The second recon mechanism was an HTTP open-tracking pixel hosted at hxxp://url860.acuityscheduling-mail[.]com/wf/open?upn=... with encoded token parameters. When the email client renders the message (even in a preview pane), this pixel fires an HTTP request back to the sender infrastructure, confirming:

  1. The mailbox is not only live but actively monitored
  2. The recipient's email client renders external content (not blocked by proxy or policy)
  3. The exact timestamp of the open event

Combined with the bounce token, this creates a two-signal confirmation loop. Bounce analysis confirms the mailbox exists at the SMTP level. The tracking pixel confirms a human is reading messages. According to the Verizon 2024 DBIR, reconnaissance is a consistent precursor to targeted spearphishing. Validated email lists are the raw material for BEC and credential harvesting campaigns that the FBI IC3 2024 Report estimated at over $2.9 billion in losses.

Why Authentication Did Not Help

Every authentication mechanism worked as designed. SPF confirmed the sending IP was authorized. DKIM confirmed message integrity. DMARC confirmed domain alignment under a REJECT policy.

None of that matters here. Authentication answers "who sent this?" It does not answer "why did they send it?" or "should this recipient receive it?" The Microsoft Digital Defense Report 2024 documents a steady rise in attacks leveraging legitimate cloud services, precisely because authentication creates a false sense of safety. CISA phishing guidance warns that even messages from trusted senders can be malicious. A DMARC REJECT policy protects the sending domain's reputation. It does nothing to protect the recipient from unsolicited messages sent through that domain's legitimate infrastructure.

This is the structural gap that behavioral detection models are designed to fill. The IRONSCALES Adaptive AI flagged this message at 77% confidence based on behavioral anomalies: first-time sender, no prior relationship between the recipient organization and the sender, and a mismatched context (a French-language woodworking receipt sent to an English-speaking ad-tech firm).

Traditional secure email gateways would pass this message without hesitation. Every link resolves to Acuity/Squarespace CDN infrastructure. There is no payload to detonate, no attachment to sandbox, and no URL reputation signal to trigger on.

The Recon Pipeline: What Comes Next

This receipt is not the attack. It is the setup. An adversary using legitimate transactional platforms for mailbox validation is building a target list for subsequent campaigns. The MITRE ATT&CK framework classifies this under T1598 (Phishing for Information) and T1589.002 (Gather Victim Identity Information: Email Addresses).

The progression is predictable: validate the mailbox, confirm the recipient reads messages, then deliver the real payload in a follow-up email that references the prior receipt or mimics the same platform branding. The IBM Cost of a Data Breach Report 2024 found that phishing remains the most expensive initial attack vector at $4.88 million per breach on average, and that cost starts with exactly this kind of target validation. The second email will also pass authentication because it will also come from a legitimate service.

Organizations that block based solely on sender reputation, domain age, or link scanning will miss both stages.

Defensive Recommendations for Recon-Stage Threats

Block HTTP tracking pixels at the mail gateway. Proxy all external image loads through a gateway-level image proxy, or strip tracking pixels entirely. This breaks the engagement confirmation loop.

Monitor for VERP-encoded bounce tokens. Return-Path values that embed the recipient address in the bounce path are a signal. Unexpected VERP-encoded messages from first-time senders warrant scrutiny.

Flag first-time sender plus contextual mismatch. A French-language woodworking receipt sent to an ad-tech company is a context gap that community-driven threat intelligence can catch when static analysis cannot. Across 1,921 organizations and 35,000+ security professionals, collective behavioral signals surface these mismatches in real time.

Treat clean recon emails as threat indicators. If a mailbox receives an unsolicited transactional receipt with no prior business relationship, the address may already be on a validated target list. Increase monitoring for follow-up phishing within 7 to 14 days.

TypeIndicatorContext
Sender Emailscheduling@acuityscheduling-mail[.]comLegitimate Acuity Scheduling sending address
Return-Pathbounces+55675-2363-{recipient}@em582.acuityscheduling-mail[.]comVERP-encoded bounce token with recipient address
Sending IP198[.]21[.]4[.]208Resolves to o9.ptr858.acuityscheduling-mail[.]com
Tracking Pixelhxxp://url860.acuityscheduling-mail[.]com/wf/open?upn=...HTTP open-tracking pixel for engagement confirmation
Logo CDNhxxps://cdn-s.acuityscheduling[.]com/logo16985997.pngHosted brand asset on Acuity CDN
DKIM Selectors1.acuityscheduling-mail[.]comValid DKIM signing selector
Internal Relaychurchill-backend-production-qw-notificationsAcuity/Squarespace internal relay hostname
Internal Relaygeopod-ismtpd-canary-0SendGrid canary relay infrastructure
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.

Explore More Articles

Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.