TL;DR A first-time Hotmail sender emailed bank staff with a 6MB PNG image of a signed wire transfer form. The image contained full originator and beneficiary account numbers, ABA routing numbers, and a $3,649.57 transfer amount. Text-based scanners and the Votiro CDR gateway cleared the attachment as clean because there was no executable payload, no embedded links, and no text to parse. The real payload was visible only to human eyes or OCR analysis. IRONSCALES flagged the email through behavioral signals: first-time sender, external free webmail targeting bank employees, and attachment context.
Severity: High Bec Wire Fraud Scanner Evasion MITRE: T1566.001 MITRE: T1204.002 MITRE: T1027

A 6MB PNG file containing a full wire transfer instruction form landed in the inboxes of four people at a regional bank. The image showed originator and beneficiary account numbers, an ABA routing number, a beneficiary address, and a $3,649.57 transfer amount. Every text-based scanner in the delivery path saw a clean image file. The Votiro Content Disarm and Reconstruction gateway sanitized the attachment and marked it safe. The real payload was visible only to the humans who opened it.

The sender was a first-time external contact using a free Hotmail account. The email was written in Spanish, addressed a bank employee by first name, and referenced a signed document. The attachment filename included the bank's name and a date. Nothing in the email body or attachment metadata triggered a single content-based detection rule.

The Visual Payload That Scanners Cannot Read

The attack delivered its entire payload as pixels. The attached PNG was a scanned image of what appeared to be a completed wire transfer instruction form. OCR extraction reveals the scope of exposed financial data:

FieldValue (Redacted)
Originator Account[redacted]
Beneficiary Account[redacted]
ABA / Routing Number[redacted]
Receiving Bank[major U.S. bank]
Transfer Amount$3,649.57
Beneficiary Address[U.S. residential address]
Purpose"Closing Account"

This is not a credential harvesting link disguised in an image. This is a direct financial instruction containing every detail a bank employee needs to initiate a wire transfer. The attacker did not need the victim to click anything, visit a phishing page, or enter credentials. They needed the victim to read the image and act on it.

The FBI IC3 2024 Internet Crime Report documented $2.77 billion in BEC losses for the year, with wire fraud remaining the dominant payment method exploited by attackers. Image-based delivery adds a layer of evasion that traditional business email compromise defenses are not built to catch.

Authentication Tells Two Different Stories

The email's journey through the delivery infrastructure created a split authentication narrative that illustrates a common blind spot in gateway architectures.

At the first hop, Microsoft's outbound protection servers evaluated the message directly from the sender's Hotmail account:

  • SPF: Pass (Microsoft's outbound IP is an authorized sender for hotmail[.]com)
  • DKIM: Pass (signature verified against hotmail[.]com selector)
  • DMARC: Pass (p=none, both SPF and DKIM aligned)
  • CompAuth: 100 (full composite authentication)

The message then transited through the recipient organization's Votiro CDR gateway at IP 44[.]206[.]213[.]130, an AWS-hosted relay that sanitizes attachments before final delivery. Because the gateway re-originates the message, the authentication chain broke at the second evaluation point:

  • SPF: Fail (Votiro's IP is not in hotmail[.]com's SPF record)
  • DKIM: Fail (body hash changed during CDR processing)
  • DMARC: Fail (neither SPF nor DKIM align post-relay)
  • ARC: Fail (chain validation failed at i=3)

The receiving mail server set SCL to -1 (trusted) based on the Votiro gateway's allowlist status, overriding the failed authentication results entirely. This is expected behavior for organizations that route mail through third-party security gateways. But it means the final delivery decision was made on gateway trust, not on message authentication (MITRE T1566.001).

See Your Risk: Calculate how many threats your SEG is missing

Why CDR Saw Nothing Wrong

Votiro's CDR technology is designed to strip active content from files: macros, embedded scripts, executable objects, OLE exploits. A PNG image contains none of these elements. The gateway correctly identified the file as a static image, sanitized it (the X-MTConnectorResult: Sanitized header confirms processing), and passed it through.

This is not a failure of the CDR product. It is a categorical limitation. CDR evaluates what a file does, not what a file shows. A wire transfer form rendered as pixels has no executable behavior to disarm. The Microsoft Digital Defense Report 2024 noted the increasing use of image-based evasion techniques specifically because they exploit this gap between content analysis and visual analysis.

The same limitation applies to text-based email security rules. DLP policies that scan for patterns like account numbers, routing numbers, or wire instructions in email body text will find nothing here. The sensitive data exists only in the image's pixel grid.

MITRE ATT&CK: Image Payload and Wire Fraud Techniques

TechniqueIDApplication
Phishing: Spearphishing AttachmentT1566.001Wire transfer form delivered as PNG attachment
User Execution: Malicious FileT1204.002Victim must open and act on image contents
Obfuscated Files or InformationT1027Financial data encoded as image pixels, invisible to text-based scanning

Observed Indicators: Image-Based Wire Fraud

IndicatorTypeContext
villagonz57@hotmail[.]comEmailSender address, first-time contact
44[.]206[.]213[.]130IPVotiro CDR relay (legitimate gateway, not attacker infrastructure)
votiro-relay1[.]prod[.]votiro[.]comHostnameCDR gateway relay
[Bank Name] transfer 03032026.pngFilename6MB PNG, scanned wire transfer form
a5558b7bf7f166ef315a4ce5b33d09daMD5Attachment file hash

How Behavioral Detection Caught What Content Scanning Missed

IRONSCALES Adaptive AI flagged this email at 55% confidence through behavioral analysis rather than content inspection. The signals that triggered detection were contextual, not payload-based:

  1. First-time sender. The Hotmail address had never contacted any employee at this organization. Across the IRONSCALES network of 1,921 organizations, first-time external senders correlate with elevated risk when combined with financial context.
  2. Free webmail targeting bank staff. A consumer email provider sending wire transfer documentation to institutional banking addresses is a pattern mismatch. Legitimate wire instructions typically arrive through established banking channels or known corporate domains.
  3. Attachment context without body content. The email body contained no account references, no invoice numbers, and no contextual detail. The entire substance was deferred to the attachment, a pattern consistent with social engineering that forces manual review rather than automated processing.

The Verizon 2024 Data Breach Investigations Report found that the human element was involved in 68% of breaches. In this case, the attack was designed so that only a human could process it. A bank employee who opens the image, reads the wire instructions, and initiates the transfer without independent verification completes the entire attack chain with no technical exploit required.

The Takeaway

Image-based payloads represent a growing blind spot in email security architectures that rely on text analysis, URL scanning, and executable content disarmament. When the payload is a photograph of a financial document, no scanner in the delivery path has anything to flag. The defense must shift from content inspection to behavioral context: who is sending this, have they sent before, does the attachment pattern match established communication norms, and does the combination of signals warrant human review before action? Organizations in financial services should treat image-only attachments from first-time external senders as a high-risk pattern, particularly when the email references wire transfers, payments, or account closures.

Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.

Explore More Articles

Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.