Threat Intelligence

Every Authentication Check Passed Because the Attacker Already Had the Keys

Written by Audian Paxson | Mar 25, 2026 11:00:00 AM
TL;DR A compromised account at a legitimate telecom provider sent a construction work order to multiple external recipients, requesting they reply all to confirm receipt. SPF, DKIM, and DMARC all passed because the sending infrastructure was genuinely authorized. The email contained no links, no attachments, and no obvious malicious content. The only payload was the reply-all instruction itself, designed to confirm live mailboxes for future targeting. Behavioral analysis flagged the first-time sender and anomalous recipient pattern, triggering quarantine within seconds of delivery.
Severity: High Account Takeover Reconnaissance MITRE: T1586.002 MITRE: T1078 MITRE: T1589.002

The email looked like every other construction work order that lands in a regional broadband provider's inbox on a Friday afternoon. A telecom vendor was requesting confirmation on a cable drop at a residential address. Ticket number, equipment specs, proposed construction date. The kind of message that gets a quick "confirmed" reply and never a second thought.

Except nobody at this telecom vendor had ever contacted the broadband provider before. The sender was flagged as first-time. And the one action the email requested, reply all to confirm receipt, was the only thing the attacker needed.

The Work Order That Needed No Links

The message arrived on a Friday at 4:07 PM UTC, formatted as a reply to an existing thread about a residential cable drop request. The subject line referenced a specific request number and street address. The body contained detailed construction metadata: a UTS/MetaSolv ticket number, exchange head end location, DSA identifier, pedestal number, proposed drop type (buried copper, 6-pair), and an estimated cost of $200.

Every field looked operationally legitimate. The formatting matched standard telecom provisioning templates. There was a note at the bottom asking the team to expedite because a temporary drop had been in place since 2023.

No links. No attachments. No QR codes. No credential harvesting forms. The only call to action was a single sentence: "Please reply all to this email to accept and confirm receipt of this drop request."

That sentence was the entire payload.

When Authentication Works Against You

Here is what makes compromised account attacks uniquely dangerous: the email infrastructure is real.

The message passed SPF validation because the sending IP was designated as a permitted sender for the telecom domain. DKIM signature verification succeeded because the message was signed with the domain's legitimate private key. DMARC alignment passed with a compauth=pass result. The ARC (Authenticated Received Chain) seals were intact across multiple Microsoft 365 hops.

Every protocol designed to prove sender legitimacy confirmed this email was authentic. Because it was. The account was real. The infrastructure was real. The person controlling the account was not.

According to the Verizon 2024 Data Breach Investigations Report, stolen credentials are involved in nearly 50% of breaches. Once an attacker controls a legitimate mailbox, they inherit every trust signal that organization has built. SPF records, DKIM keys, DMARC policies. All of it works in the attacker's favor.

The FBI IC3 2024 Internet Crime Report documented over $2.9 billion in Business Email Compromise losses, with compromised accounts serving as the launch point for many of these campaigns.

The Reply-All Trap

The social engineering here was deliberately understated. The attacker chose a message that would feel routine and low-stakes. A construction work order confirmation. Not an urgent wire transfer. Not a CEO demanding gift cards. Just a standard operational request that any recipient would handle on autopilot.

The reply-all instruction is the key. When recipients respond to confirm, the attacker learns several things simultaneously. Which email addresses on the thread are active and monitored. Which recipients respond quickly (indicating they can be pressured in follow-up attacks). What role each person plays, based on their reply content and signature block. And whether any additional internal email addresses appear in CC lines or forwarded threads.

This maps directly to MITRE ATT&CK T1589.002 (Gather Victim Identity Information: Email Addresses). The attacker is building a validated target list for the next stage of the campaign, whether that is business email compromise, invoice fraud, or lateral movement into other connected organizations.

The technique also aligns with T1078 (Valid Accounts) for the initial access vector and T1586.002 (Compromise Accounts: Email Accounts) for the resource development phase.

The Signal That Content Scanners Cannot See

Traditional email security evaluates what is inside a message. Links get detonated in sandboxes. Attachments get scanned. Natural language processing looks for urgency cues and financial requests. This email had none of those. Content-based analysis would score it as clean, and it did. Microsoft's anti-spam engine assigned it an SCL of 1 (lowest spam confidence).

The Microsoft Digital Defense Report 2024 highlights that threat actors are increasingly using legitimate services and compromised accounts specifically because these methods bypass content-focused security controls.

What caught this email was behavioral analysis. The sender had never contacted the recipient organization before. The recipient list mixed internal addresses with external ones across multiple unrelated domains, including a personal Gmail account. The message arrived from an authenticated Microsoft 365 tenant but displayed communication patterns inconsistent with an established vendor relationship.

Themis, the IRONSCALES Adaptive AI engine, evaluated the behavioral context rather than just the content. First-time sender to the organization. Anomalous recipient grouping. External mail caution flag triggered. Within seconds, the message was quarantined across four affected mailboxes before any recipient could reply.

See Your Risk: Calculate how many threats your SEG is missing

What a Benign-Looking Email Can Cost You

If the reply-all responses had gone through, the attacker would have walked away with a confirmed map of active mailboxes, response times, and organizational relationships. That intelligence fuels the next phase: a targeted BEC attack referencing the exact work order thread, sent from the same trusted account, to recipients who already "know" the sender.

According to IBM's 2024 Cost of a Data Breach Report, the average cost of a breach involving stolen or compromised credentials is $4.81 million, and these breaches take an average of 292 days to identify and contain. The reconnaissance phase that this email represents is where those 292-day timelines begin.

CISA's phishing guidance emphasizes that organizations should verify unexpected requests through out-of-band channels, even when messages appear to come from known vendors. In this case, a phone call to the telecom provider's operations desk would have confirmed that no such work order existed.

Indicators of Compromise

TypeIndicatorContext
Sending Domaintdstelecom[.]comCompromised authenticated account
Sender AddressConner[.]DiPersio@tdstelecom[.]comFirst-time sender to recipient organization
Return-PathConner[.]DiPersio@tdstelecom[.]comMatches From header (alignment pass)
Sending IP2a01:111:f403:c107::1Microsoft 365 outbound protection relay
AuthenticationSPF=pass, DKIM=pass, DMARC=passFull authentication from compromised tenant

Defensive Takeaways

Treat first-time senders as high-risk, regardless of authentication status. SPF, DKIM, and DMARC prove infrastructure authorization, not sender intent. A first-time sender from a fully authenticated domain deserves the same scrutiny as an unauthenticated one.

Monitor for zero-payload social engineering. Emails requesting replies, confirmations, or callbacks without containing any links or attachments are invisible to content-based scanners. Behavioral baselines that track sender relationships and communication patterns are the only effective detection layer.

Validate operational requests through out-of-band channels. When a vendor sends a work order, service request, or invoice for the first time, confirm it through a known phone number or portal. The 30 seconds this takes can prevent months of exposure.

Watch for reply-all instructions in external emails. Legitimate business communications rarely require reply-all confirmation to a mixed group of internal and external recipients. This pattern should trigger additional review, either automated or by a trained security operations team.

Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.