Threat Intelligence

The Debt Collection Notice That Passed Every Authentication Check

Written by Audian Paxson | Jan 10, 2026 7:30:00 AM
TL;DR A first-time sender using a debt collection brand delivered what appeared to be a healthcare billing statement to an employee at a healthcare services company. The email passed SPF, DKIM, and DMARC with composite authentication of 100, relayed through SendGrid infrastructure and a third-party mailing platform. The statement itself was rendered as a single embedded image containing account numbers, payment amounts, a QR code, and a mailing address. No text-based scanner could read any of it. All clickable links routed through SendGrid tracking redirectors to a third-party payment portal, masking the true destination from URL inspection. IRONSCALES flagged the email through first-time sender detection and community intelligence at 50% confidence.
Severity: High Brand Impersonation Healthcare Billing Fraud Scanner Evasion MITRE: {'id': 'T1566.002', 'name': 'Phishing: Spearphishing Link'} MITRE: {'id': 'T1036.005', 'name': 'Masquerading: Match Legitimate Name or Location'} MITRE: {'id': 'T1598.003', 'name': 'Phishing for Information: Spearphishing Link'}

An employee at a healthcare services company received what looked like a legitimate debt collection notice from a well-known billing agency. The subject line referenced a specific healthcare provider and included an account number. The email passed SPF, DKIM, and DMARC. Microsoft's composite authentication scored it at 100. The sending infrastructure was a real third-party mailing platform. And the billing statement itself was rendered as a single image, making every line of account detail, every dollar amount, and every payment instruction completely invisible to text-based security scanners.

The only reason this email got flagged: IRONSCALES had never seen this sender contact the organization before, and community intelligence across 1,921 organizations recognized the pattern.

Three Domains, One Deception

The attack used a three-domain delivery chain that made source attribution deliberately difficult.

The email arrived from noreply@frostarnett[.]net, a domain impersonating a real debt collection agency. The message was injected through SendGrid infrastructure (geopod-ismtpd-8) and relayed via o12[.]enotice[.]revspringinc[.]com (IP 167[.]89[.]100[.]33), a subdomain associated with a legitimate healthcare communications platform. From there, Microsoft Exchange Online Protection accepted delivery.

Each domain in the chain serves a different function:

DomainRoleRegistration
frostarnett[.]netSender identity (impersonated brand)2017, Network Solutions
revspringinc[.]comMailing relay infrastructure2012, GoDaddy
facpayments[.]comPayment portal destination2007, Network Solutions

All three domains have legitimate registrations dating back years. None would trigger age-based or reputation-based blocking. The attacker either compromised these domains' sending infrastructure or registered lookalikes that pass casual inspection. The long registration histories make both scenarios plausible and neither is easily distinguishable at the gateway level.

The Microsoft Digital Defense Report 2024 highlighted the growing use of legitimate mailing infrastructure to bypass reputation-based defenses, noting that attackers increasingly route phishing through established ESPs and third-party relay services.

Authentication That Proves Nothing

The email's authentication headers tell a story that every legacy gateway would interpret as trustworthy:

  • SPF: Pass (167[.]89[.]100[.]33 is an authorized sender for em5664[.]frostarnett[.]net)
  • DKIM: Pass (rsa-sha256 signature verified for frostarnett[.]net, selector s1)
  • DMARC: Pass (action=none)
  • CompAuth: 100 (full composite authentication)
  • SCL: 1 (low spam confidence)

Every check passed. The email reached the inbox with no warnings, no quarantine, no banner beyond the standard external-sender notice.

But one detail undermines the entire authentication posture: the DMARC policy for frostarnett[.]net is p=none. That means even if authentication had failed, the receiving server was instructed to deliver the message anyway and simply report the failure. A DMARC policy of p=none provides monitoring data to the domain owner but zero protection to the recipient. According to the FBI IC3 2024 Internet Crime Report, BEC and phishing campaigns caused $2.77 billion in losses, with brand impersonation through weakly configured authentication domains remaining a primary vector.

The anti-spam headers tell a more nuanced story than the authentication summary suggests. Microsoft's Forefront filter tagged the message with SFTY:9.25, a safety classification flag associated with financial impersonation. Despite this signal, the message was delivered to the inbox with SCL 1.

See Your Risk: Calculate how many threats your SEG is missing

The Visual Payload: A Statement Scanners Cannot Read

The email body contained minimal HTML: a debt-collector disclosure notice, a line about internet connection speed, and an embedded statement image. The statement itself was the attack surface.

Rendered as a single image, the billing statement displayed:

  • A branded header with the collection agency's logo and QR code
  • A recipient name and full mailing address
  • A specific healthcare provider name as the original creditor
  • Account balances, interest charges, and payment credits
  • A total debt amount
  • Dispute instructions with a 30-day deadline
  • A physical mailing address for payment

None of this content existed as parseable text in the email body or HTML source. Every detail lived in the pixel grid of the rendered image. DLP rules scanning for account numbers, dollar amounts, or healthcare provider names found nothing. Content filters checking for social engineering language found nothing. The Verizon 2024 Data Breach Investigations Report documented that 68% of breaches involved a human element. This attack was engineered so that only a human could process its payload.

The statement image also contained a QR code in the upper-left quadrant. QR codes embedded in images represent a compounding evasion layer: not only must the scanner perform OCR on the image, but it must then decode the QR payload to discover the encoded URL. Most gateway scanners perform neither operation on inline images.

Links Hidden Behind SendGrid Redirects

Every clickable element in the email routed through SendGrid tracking infrastructure at u23308835[.]ct[.]sendgrid[.]net. The primary call-to-action resolved through a SendGrid click tracker to facpayments[.]com, the Frost-Arnett payment portal.

URL scanners evaluating the email at delivery time saw sendgrid[.]net domains. SendGrid is a widely trusted ESP used by millions of legitimate senders. The CISA phishing guidance warns that attackers exploit trusted platforms and services to bypass URL reputation checks. In this case, the true destination was hidden behind the redirect until a recipient actually clicked.

The Return-Path header exposed an additional detail: it contained a VERP-encoded string (bounces+23308835-8cd9-[recipient]=[recipient-domain][.]com@em5664[.]frostarnett[.]net) that embedded the recipient's full email address in the bounce path. This is standard for SendGrid delivery tracking, but it also confirms the message was individually targeted rather than blindly sprayed.

MITRE ATT&CK Mapping

TechniqueIDApplication
Phishing: Spearphishing LinkT1566.002SendGrid-wrapped links to payment portal
Masquerading: Match Legitimate Name or LocationT1036.005Impersonation of debt collection brand and healthcare provider
Phishing for Information: Spearphishing LinkT1598.003Payment portal designed to collect financial information

Indicators of Compromise

IndicatorTypeContext
noreply@frostarnett[.]netEmailSender address (impersonated brand)
em5664[.]frostarnett[.]netDomainSPF envelope domain
167[.]89[.]100[.]33IPSending IP (SendGrid infrastructure)
o12[.]enotice[.]revspringinc[.]comHostnameMailing relay
u23308835[.]ct[.]sendgrid[.]netDomainClick tracking redirector
hxxps://www[.]facpayments[.]com/URLPayment portal destination
geopod-ismtpd-8HostnameSendGrid injection point

Why First-Time Sender Detection Was the Only Defense That Worked

This email defeated every content-based and authentication-based defense in the delivery path. SPF, DKIM, and DMARC passed. The sending IP had legitimate ESP reputation. The domains were years old. The statement content was invisible to text scanners. The links pointed to trusted redirect infrastructure.

IRONSCALES Adaptive AI flagged the message at 50% confidence through two signals that no content scanner evaluates:

  1. First-time sender. The noreply@frostarnett[.]net address had never contacted this organization. For a company that processes healthcare billing daily, a debt collection sender that has no prior communication history is anomalous.
  2. Community intelligence. Across the IRONSCALES network, similar messages from this sender pattern had been resolved as phishing by security teams at other organizations, generating a community signal.

The IBM Cost of a Data Breach Report 2024 found that healthcare remains the most expensive industry for data breaches at $9.77 million per incident. Healthcare billing impersonation attacks like this one exploit the industry's high volume of legitimate financial communications. When every employee processes dozens of real billing notices per week, the attacker's job is to make one more look exactly like the rest.

Organizations that depend on authentication signals and URL reputation to stop healthcare email threats are structurally blind to attacks that pass every technical check and deliver their payload as an image. The defense must be behavioral: who is this sender, have they contacted us before, and does the community recognize this pattern?

Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.