TL;DR A credential harvesting campaign impersonated Dropbox through Amazon SES. The message passed SPF, DKIM, and DMARC at the sending hop, but Votiro CDR sanitization broke all three checks in transit. The CTA linked through awstrack.me to dropbox.traunitz[.]com. With authentication destroyed by the inline security tool, behavioral analysis identified the sender-content mismatch.
Severity: High Credential Harvesting Brand Impersonation MITRE: {'id': 'T1566.002', 'name': 'Phishing: Spearphishing Link'} MITRE: {'id': 'T1036.005', 'name': 'Masquerading: Match Legitimate Name or Location'} MITRE: {'id': 'T1583.001', 'name': 'Acquire Infrastructure: Domains'}

The email said "LEGAL Department (vantagebank[.]com)" shared an "AgingReport" on Dropbox. The From address was legal@smleather[.]com. The link went to neither domain. And the inline security tool that was supposed to protect the recipient destroyed the only authentication signal that would have caught it.

This credential harvesting campaign exploited a gap that most security stacks never account for: what happens when your own Content Disarm and Reconstruction (CDR) tool breaks email authentication in transit.

Authentication That Passed, Then Failed

At the Amazon SES sending hop (IP 54[.]240[.]48[.]119), the message had clean authentication. SPF passed for smleather[.]com. DKIM passed with a valid signature tied to the same domain. DMARC passed.

Then the message hit the Votiro CDR relay at votiro-relay1[.]prod[.]votiro[.]com (IP 44[.]206[.]213[.]130). Votiro sanitized the content, modifying the message body in transit. That modification invalidated the DKIM signature. With DKIM broken, DMARC re-evaluated and failed, returning an action=oreject disposition. SPF also failed at the next hop because the Votiro relay IP was not authorized for the original sender domain.

The CDR tool did its job on the content. In the process, it stripped the authentication markers that downstream filters use to make trust decisions.

A Redirect Chain Built on Trusted Infrastructure

The "View on Dropbox" CTA did not link to Dropbox. It routed through awstrack[.]me, Amazon's legitimate SES click-tracking service, before landing on dropbox[.]traunitz[.]com. That is a classic brand subdomain impersonation pattern: placing "dropbox" as a subdomain on an attacker-controlled domain, fronted by Cloudflare.

At scan time, the landing page returned a 404. This is consistent with time-gated credential harvesting pages that activate only for targeted recipients, then disappear.

The Behavioral Signal That Survived

With authentication destroyed by the CDR relay, the only remaining detection surface was behavioral. The sender domain (smleather[.]com) had no relationship to the claimed brand (Dropbox) or the referenced organization (vantagebank[.]com). The sender was contacting the recipient for the first time.

Adaptive AI identified the sender-content mismatch and first-time sender signal, flagging the message despite the ambiguous authentication results.

See Your Risk: Calculate how many threats your SEG is missing

Indicators of Compromise

TypeIndicatorContext
Sender Emaillegal@smleather[.]comSender address, Amazon SES origin
Sending IP54[.]240[.]48[.]119Amazon SES infrastructure
CDR Relayvotiro-relay1[.]prod[.]votiro[.]comVotiro CDR that broke authentication
CDR Relay IP44[.]206[.]213[.]130Votiro relay IP
Redirectawstrack[.]meAmazon SES click-tracking redirect
Credential Harvestdropbox[.]traunitz[.]comBrand subdomain, Cloudflare-fronted

MITRE ATT&CK Mapping

TechniqueIDRelevance
Phishing: Spearphishing LinkT1566.002Delivery via embedded redirect chain
MasqueradingT1036.005Dropbox brand impersonation
Acquire Infrastructure: DomainsT1583.001Brand subdomain registration
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.

Explore More Articles

Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.