Salesforce Pardot Infrastructure Weaponized in Fabricated-Thread CRM Consulting Phish

TL;DR An attacker weaponized Salesforce Marketing Cloud (ExactTarget) and Pardot infrastructure to deliver a fabricated email thread impersonating a CRM consulting firm. The message passed SPF, DKIM, and DMARC authentication with a compauth score of 100. A privacy-shielded domain registered through a budget registrar carried the DKIM signature while Salesforce-owned relay infrastructure handled delivery. Five distinct tracking mechanisms, including CSS-based dark mode and print detection pixels, enabled multi-signal reconnaissance. The only visible link pointed to a legitimate Pardot unsubscribe endpoint.
Severity: High Brand Impersonation Social Engineering Reconnaissance MITRE: T1566.002 MITRE: T1598.003 MITRE: T1585.002

Every link in this email pointed to Salesforce-owned infrastructure. Every authentication check passed. The sending IP belonged to a Salesforce Marketing Cloud relay. And the Pardot unsubscribe endpoint at the bottom functioned exactly as expected. The only problem: the entire message was a phishing lure built on a fabricated email thread, sent from a privacy-shielded domain registered less than two years earlier.

This case demonstrates why authentication alone cannot stop phishing. When attackers provision accounts on trusted marketing platforms, they inherit the sending reputation of billion-dollar SaaS companies. The technical signals say "legitimate." The behavioral signals say otherwise.

Salesforce Infrastructure as a Phishing Delivery Vehicle

The attack used Salesforce Marketing Cloud (formerly ExactTarget) as its mail transfer agent (MTA). The message originated from amg5.mta.exacttarget.com at IP 128.245.249.5, a Salesforce-owned relay. The envelope return-path pointed to bounce[.]s13[.]mc[.]pd25[.]com, another Salesforce domain handling bounce processing for Marketing Cloud sends.

Authentication results reflected this legitimate infrastructure:

  • SPF: Pass (128.245.249.5 is an authorized sender for bounce[.]s13[.]mc[.]pd25[.]com)
  • DKIM: Pass (signature domain servicetechcentre[.]com)
  • DMARC: Pass
  • compauth: Pass, reason=100 (Microsoft's composite authentication score, the highest possible)

The attacker registered servicetechcentre[.]com on May 20, 2024, through Cosmotown, Inc., a budget registrar. WHOIS records are fully privacy-shielded. DNS runs through Cloudflare. The domain was less than two years old at the time of the attack, yet it carried a perfect composite authentication score because Salesforce's infrastructure vouched for it.

This maps to MITRE ATT&CK T1585.002 (Establish Accounts: Email Accounts) and T1566.002 (Phishing: Spearphishing Link). The attacker provisioned a Marketing Cloud account, configured DKIM signing for their domain, and leveraged Salesforce's sending reputation to bypass gateway filters.

Fabricated Thread and Social Engineering Construction

The subject line read "RE: Jenna," mimicking a reply to an ongoing conversation. This is a deliberate social engineering choice. Recipients who see "RE:" in a subject line assume prior context exists and lower their guard. The FBI IC3 2024 report documents business email compromise (BEC) as the costliest cybercrime category, and fabricated thread techniques are a core BEC tactic.

The email body reinforced the deception with a two-layer structure:

  1. Outer message: A short, personalized scheduling request ("Does Tuesday at 2:15 PM EST or Thursday at 11:00 AM EST work?") signed by "Christina." This mimics a genuine reply to create familiarity.
  1. Embedded "forwarded" message: A full marketing pitch from "V360," a supposed Salesforce consulting firm, offering "on-demand Salesforce consultants" and a "free CRM Health Checkup and issue discovery session." The forwarded block included fabricated headers (From, Sent, To, Subject) to simulate a prior email exchange.

The physical address in the signature (1047 Brea Mall, CA 92821) maps to a shopping mall in Brea, California. Not a registered business address for any Salesforce consulting partner.

This maps to MITRE ATT&CK T1598.003 (Phishing for Information: Spearphishing Link). The goal was reconnaissance and engagement, not immediate credential theft.

See Your Risk: Calculate how many threats your SEG is missing

Five-Layer Tracking and Reconnaissance Apparatus

The message contained no credential harvesting links. The only visible hyperlink pointed to a legitimate Pardot unsubscribe confirmation endpoint:

hxxp://go[.]pardot[.]com/unsubscribeConfirm/1103432/32eb6f8ec51d874f9776dd3af1f2b83bca8459a48de013c724919de7750a1a99/1641155776

But the absence of a malicious URL does not mean the absence of a payload. Hidden in the HTML source were five distinct tracking mechanisms:

Tracking MethodDomainPurpose
Pardot open pixelgo[.]pardot[.]com/r/.../open/1Standard open tracking via 1x1 image
emltrk light mode pixelwo27degz.emltrk[.]com/v2/wo27degz?rlDetects light-mode email client opens
emltrk dark mode pixelwo27degz.emltrk[.]com/v2/wo27degz?rdDetects dark-mode email client opens
emltrk print pixelwo27degz.emltrk[.]com/v2/wo27degz?pDetects when recipient prints the email
emltrk forward detectionwo27degz.emltrk[.]com/v2/wo27degz?fDetects Outlook/Thunderbird forwarding via header-table CSS selectors

The CSS-based tracking is particularly sophisticated. Instead of relying on standard image tags that many email clients block by default, the attacker embedded tracking URLs inside CSS @media queries and element-specific background-image rules. The prefers-color-scheme media queries differentiate between dark and light mode users. The div.OutlookMessageHeader and table.moz-email-headers-table selectors fire specifically when the email is forwarded in Outlook or Thunderbird, respectively. According to the Microsoft Digital Defense Report 2024, reconnaissance operations like this feed attacker targeting databases for higher-confidence follow-up campaigns.

The emltrk[.]com domain has been registered since 2010 and runs on AWS infrastructure. It functions as a dedicated email tracking service.

How IRONSCALES Detected What Authentication Could Not

Microsoft's own spam filter assigned this message an SCL (Spam Confidence Level) of 5, flagging it for junk delivery. But SCL scoring is a blunt instrument. The Forefront anti-spam headers show category SPM (spam), not phishing. The message would have landed in junk, not been quarantined.

IRONSCALES Adaptive AI classified this incident with 90% confidence based on behavioral and community intelligence signals. Two mailboxes were quarantined. The detection relied on first-time sender analysis, sender/brand mismatch (the From domain servicetechcentre[.]com promoting a brand called "V360"), and community reputation data from similar incidents across the IRONSCALES network of 17,000+ customer environments.

The Verizon DBIR 2024 confirms that pretexting (fabricated scenarios) now accounts for over 40% of social engineering incidents. This case is a textbook example: the attacker built a false business relationship through a fabricated thread, used a legitimate platform for credibility, and deployed reconnaissance tracking to identify which recipients engaged.

Pardot Campaign Infrastructure

IndicatorTypeContext
servicetechcentre[.]comDomainSender/DKIM domain, registered 2024-05-20 via Cosmotown
christina@servicetechcentre[.]comEmailFrom address
bounce-N26EPGSYXE7E7IXOWB5GGQLMGY.130014@bounce[.]s13[.]mc[.]pd25[.]comEmailEnvelope return-path (SFMC bounce handler)
128.245.249.5IPExactTarget MTA (amg5.mta.exacttarget.com)
hxxp://go[.]pardot[.]com/unsubscribeConfirm/1103432/...URLPardot unsubscribe endpoint
hxxp://go[.]pardot[.]com/r/1103432/1/1641155776/open/1URLPardot open tracking pixel
hxxps://wo27degz[.]emltrk[.]com/v2/wo27degzURLCSS-based multi-signal tracking pixel
wo27degzTracking IDemltrk campaign identifier

Blocking Marketing Platform Abuse Before the Follow-Up Campaign

Do not trust authentication results as a proxy for sender legitimacy. SPF, DKIM, and DMARC confirm authorization, not intent. Any attacker who provisions a Marketing Cloud account and configures DNS records will pass all three checks. Per CISA guidance on phishing recognition, organizations should layer behavioral detection on top of authentication verification.

Treat marketing automation infrastructure as a potential threat vector. Pardot, HubSpot, Mailchimp, and SendGrid accounts are trivial to provision. Security teams should monitor for first-time senders using known marketing platform relays, especially when the sending domain is recently registered or privacy-shielded.

Block or flag CSS-based tracking techniques. The emltrk[.]com tracking pattern (CSS media queries for dark/light/print/forward detection) is reusable across campaigns. Adding this domain to blocklists disrupts the attacker's reconnaissance loop. Organizations using email security platforms should ensure pixel-stripping extends beyond standard image tags to include CSS-embedded tracking URLs.

Scrutinize "RE:" and "FW:" prefixes on first-time sender messages. A reply or forward from someone who has never emailed your organization before is a strong behavioral signal. Automated detection systems should weight this combination heavily in risk scoring.

Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.

Explore More Articles

Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.