Threat Intelligence

Crystal Reports Invoice Fraud with NULL Address Fields Routed Through Exclaimer Relay

Written by Audian Paxson | Nov 29, 2025 6:00:00 AM
TL;DR An invoice PDF generated by Crystal Reports contained NULL placeholder values in address fields, a telltale sign of template-based fraud. The email passed DKIM and DMARC but failed SPF due to routing through an Exclaimer relay at 104[.]209[.]35[.]28. ARC-Seal failed at i=2. The 61,558-byte PDF contained no JavaScript or links. Payment instructions directed funds to a Butterfield bank account.

What Happened

An invoice email arrived from jacquesscott[.]com, a domain registered in the Cayman Islands in 2002 with WHOIS privacy enabled. The message carried a 61,558-byte PDF attachment generated by Crystal Reports. Inside the PDF, multiple address fields contained NULL placeholder values where sender details should have appeared. No JavaScript, no embedded links, and no interactive form elements were present in the document.

The email passed DKIM and DMARC validation, but SPF failed. The failure traced to routing through an Exclaimer relay at 104[.]209[.]35[.]28. Exclaimer is a legitimate email signature management service, but when messages pass through its relay, the sending IP changes. If the relay IP is not listed in the domain's SPF record, authentication breaks. ARC-Seal validation also failed at i=2, confirming the chain of trust was compromised during transit.

Payment instructions in the PDF directed funds to a Butterfield bank account, an offshore banking institution headquartered in Bermuda with branches across the Caribbean.

Why It Matters

Crystal Reports is a legitimate enterprise reporting tool used to generate invoices, financial statements, and business documents. Attackers exploit this legitimacy because PDFs generated by Crystal Reports carry metadata and formatting that matches what recipients expect from real vendors. The NULL address fields reveal the fraud: a legitimate vendor populating their own invoice template would never leave address fields empty.

The SPF failure is significant but not decisive on its own. Many legitimate organizations route mail through third-party services that cause SPF failures. This is precisely why attackers choose relay paths through services like Exclaimer: the resulting SPF failure looks like a configuration oversight rather than a threat signal.

Combining the SPF failure with the domain's Cayman Islands registration, WHOIS privacy, NULL template fields, and offshore banking payment instructions creates a risk profile that no single indicator would trigger alone.

How IRONSCALES Caught It

Community intelligence across the IRONSCALES network identified patterns matching this campaign across multiple tenants. The combination of Crystal Reports metadata, NULL address fields, and Exclaimer relay routing formed a behavioral fingerprint that adaptive AI email security correlated with known invoice fraud patterns.

The ARC-Seal failure at i=2 provided an additional signal that the message had been tampered with or routed through an untrusted path, reinforcing the risk assessment from behavioral analysis.

See Your Risk. Run a free phishing simulation to measure how many invoice fraud emails bypass your current gateway.

Indicators of Compromise

IndicatorTypeValue
Case IDInternal10050d53ae12ce2dfac71b96c6f62d54
Sender DomainDomainjacquesscott[.]com
Domain RegistrationInfrastructureCayman Islands, 2002, WHOIS privacy
Relay IPIP Address104[.]209[.]35[.]28
Relay ServiceInfrastructureExclaimer
PDF SizeAttachment61,558 bytes
PDF GeneratorMetadataCrystal Reports
Payment DestinationBankingButterfield bank
SPFAuthenticationfail
DKIMAuthenticationpass
DMARCAuthenticationpass
ARC-SealAuthenticationcv=fail at i=2

MITRE ATT&CK Mapping

TacticTechniqueIDNotes
Initial AccessPhishing: Spearphishing AttachmentT1566.001Crystal Reports PDF invoice
Defense EvasionMasqueradingT1036NULL address fields in template-generated PDF
Defense EvasionTrusted RelationshipT1199Exclaimer relay used to obscure origin
ImpactFinancial TheftT1657Payment directed to offshore Butterfield bank account
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.