The Web Design Pitch That Routed Through a Mailing List Nobody Subscribed To

TL;DR A cold-outreach vendor scam offering web design services was sent from a Gmail account (luzkyptate@gmail[.]com) but routed through a Google Groups mailing list hosted on bluecoreinnovation[.]com, a privacy-protected domain registered seven months prior through Namecheap. This relay pattern caused the envelope Return-Path to use bluecoreinnovation.com while the visible From header displayed gmail.com, producing split authentication results: SPF passed for Gmail but returned 'none' for the envelope domain. The message was sent to undisclosed-recipients via BCC, and the sender identity could not be verified. Community intelligence classified it as phishing with 90% confidence.
Severity: Medium Vendor Scam Reconnaissance MITRE: T1566.002 MITRE: T1583.001 MITRE: T1586.002

The email looked like a routine cold pitch for web design services. The body was professional, the offer was plausible, and the formatting was clean. What distinguished it from a legitimate freelancer's outreach was the delivery infrastructure beneath it: a personal Gmail account posting through a Google Groups mailing list on a domain registered seven months earlier with privacy-protected WHOIS, distributing to undisclosed recipients via BCC, with the sender's display name not matching the signature.

The message contained no links in the body. No attachments. No credential request. Its purpose was to establish contact and validate the target mailbox for a future follow-up that would carry the actual payload.

Community intelligence classified it as phishing with 90% confidence. The mailbox was flagged by automated threat detection.

Two Domains, One Message, Split Authentication

The visible From header showed Luz Tate at luzkyptate@gmail[.]com. The envelope Return-Path, however, used an entirely different domain: luzkyptate03+bncBDG7P3EOWYKBBYMMZ3HAMGQEJQCY5QY@bluecoreinnovation[.]com. This mismatch is the result of the Google Groups relay pattern.

The sender posted the message from their Gmail account to a Google Groups mailing list (luzkyptate03@bluecoreinnovation[.]com). Google Groups then redistributed the message to the target, using the group address as the envelope sender while preserving the original Gmail address in the header From. This is standard Google Groups behavior, not a misconfiguration, but it creates an authentication split that attackers can exploit.

SPF evaluation differed depending on which domain was checked. For the Gmail address (the header From), SPF passed because Google's sending IPs are authorized for gmail[.]com. For the bluecoreinnovation[.]com envelope address, SPF returned "none" because the domain does not publish SPF records that authorize Google's group relay IPs. DMARC evaluated against the header From (gmail.com) and returned a pass under Gmail's p=NONE policy, while a separate DMARC evaluation against bluecoreinnovation.com returned anomalous results.

The net effect: the message arrives with mixed authentication signals. Some gateway evaluations will see SPF pass and DMARC pass (for Gmail). Others will see SPF none (for the envelope domain). This confusion can produce inconsistent filtering outcomes depending on which domain the receiving gateway prioritizes.

See Your Risk: Calculate how many threats your SEG is missing

A Young Domain With a Familiar Name

WHOIS records for bluecoreinnovation[.]com show the domain was created on May 18, 2025, registered through Namecheap with privacy protection enabled. The domain is approximately seven months old at the time of this incident, which places it in the window where many throwaway domains are used for a single campaign before being abandoned.

The name "BlueCore Innovation" closely resembles Bluecore (bluecore.com), an established marketing technology company. Whether the similarity is intentional or coincidental, lookalike domain names that mirror known brands create trust signals that recipients and automated systems may misinterpret. A receiving gateway that performs domain reputation checks may find no derogatory records for a domain this young, interpreting the absence of negative signals as neutral rather than suspicious.

The Google Groups infrastructure on this domain (luzkyptate03@bluecoreinnovation[.]com) was configured as a mailing list, complete with List-Post, List-Help, List-Archive, List-Subscribe, and List-Unsubscribe headers. This full set of mailing-list metadata makes the message appear to be a legitimate group distribution, further reducing the likelihood of spam classification by gateways that give preferential treatment to messages with valid list headers.

The Body That Was Almost Too Clean

The message body was a short, professional cold pitch offering custom website design, UI/UX, WordPress, Shopify, CMS development, e-commerce, landing pages, and SEO services. The greeting was generic ("Hi there"). The tone was conversational. There were no spelling errors, no urgency cues, and no credential or payment requests.

Two details broke the pattern. First, the display name in the From header was "Luz Tate," but the signature at the bottom read "Lucky," an inconsistency that suggests a reusable template where the signature was not updated to match the current sender identity. Second, the message was sent to "undisclosed-recipients:;" with a BCC header, confirming mass distribution despite the personal, one-to-one tone.

A public identity search for "Luz Tate" or "Lucky" at the Gmail address returned no verifiable professional profile, portfolio, or business registration. The sender was a first-time contact to the recipient organization and was flagged as high risk.

IRONSCALES Adaptive AI classified the message as a vendor scam at 90% confidence. Community intelligence across the network reinforced the classification based on pattern matching against similar campaigns.

MITRE ATT&CK Alignment

TechniqueIDApplication
Phishing: Spearphishing LinkT1566.002Cold-outreach lure designed to establish contact for follow-up payload delivery
Acquire Infrastructure: DomainsT1583.001Young, privacy-protected domain hosting Google Groups relay infrastructure
Compromise Accounts: Email AccountsT1586.002Personal Gmail account used as the originating sender

IOC Summary Table

TypeIndicatorContext
Header Fromluzkyptate@gmail[.]comPersonal Gmail, no verifiable identity
Envelope Fromluzkyptate03@bluecoreinnovation[.]comGoogle Groups relay domain
Relay Domainbluecoreinnovation[.]comCreated 2025-05-18, Namecheap, privacy-protected WHOIS
Display NameLuz TateDoes not match signature name "Lucky"
DistributionBCC to undisclosed-recipientsMass distribution pattern
List HeadersFull set (Post, Help, Archive, Subscribe, Unsubscribe)Google Groups mailing-list metadata
SPF (Gmail)PassGoogle IPs authorized for gmail.com
SPF (Envelope)Nonebluecoreinnovation.com does not authorize sending IPs
DMARC (Gmail)Pass (p=NONE)Gmail policy allows pass despite SPF split

Detecting the Relay Behind the Pitch

Google Groups relay abuse is operationally distinct from direct-send phishing. The relay provides legitimate mailing-list headers, Google-signed ARC chains, and clean domain reputation inherited from the group infrastructure. Detection must look past the relay to the campaign behind it.

Flag envelope and header From mismatches involving young domains. When the Return-Path domain differs from the header From domain and the envelope domain is less than a year old with privacy-protected WHOIS, the message warrants elevated review regardless of whether authentication passes for the header domain.

Treat BCC distribution with mailing-list headers as suspicious for cold outreach. Legitimate mailing lists have subscribers. A Google Groups list on a young domain distributing unsolicited cold pitches via BCC to external recipients is a distribution technique, not a subscription service.

Evaluate display-name and signature consistency. When the From display name does not match the signature block, the template was reused across identities. This is a low-confidence but high-specificity signal for mass-campaign infrastructure.

Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.

Explore More Articles

Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.