Table of Contents
The attachment was a 112KB PDF titled after a state department of education. The email passed SPF, DKIM, DMARC, and ARC. The sender's domain was a legitimate .org government education address. Every authentication header came back green. And not a single automated scanner on the planet could open the file, because the attacker locked it with a password and handed the key to the human recipient in the same email body.
"PDF Passcode: 0937728736."
That one line is the entire evasion strategy. Give the machine a locked door. Give the person the key. Watch the security stack fail while the target clicks through.
Get a Demo: See how IRONSCALES detects attacks that bypass your scanner
The Passcode-in-the-Body Playbook
A mid-size law firm received an email with the subject line referencing a "Completed Document" and an "Approved New Statement" from what appeared to be a state education agency. The sender was a paraprofessional at a regional academy for the blind, sending from a legitimate government education domain hosted on Microsoft 365.
The email carried two attachments. The first: a password-protected PDF (112KB) branded with a state department of education name. The second: a 112KB PNG image, an official department logo embedded for visual legitimacy. The message body included the PDF passcode in plain text, inviting the recipient to unlock and review the "approved statement."
Here is where it gets interesting. The email was sent TO the sender's own address. The actual targets, including the law firm employee, were BCC'd. This is a bulk distribution technique (MITRE T1566.001) that hides the full target list from every recipient and makes the campaign's scale invisible to incident responders.
The recipient had never received email from this sender or this domain before. First-time sender. Cross-sector communication (education to legal). Password-protected attachment. Passcode in the body. Every one of these is a red flag individually. Together, they form a textbook sandbox evasion attack chain.
Why Every Scanner Failed
Password-protected attachments are not a new technique, but they remain devastatingly effective because they exploit a fundamental architectural limitation in email security. Sandboxes work by opening, detonating, and analyzing files in an isolated environment. A password-locked PDF cannot be opened without the password, and no mainstream email scanner extracts passcodes from email bodies to unlock attachments in transit.
According to CISA advisory AA23-352A, threat actors increasingly use encrypted or password-protected files to evade automated analysis, a trend that has accelerated alongside improvements in sandbox detection capabilities. The technique maps directly to MITRE T1027 (Obfuscated Files or Information), where encryption serves as the obfuscation layer.
In this case, the sandbox logged a "file access failure" on the PDF. It could not open the document. It could not scan the contents. It could not determine whether the file contained a credential harvesting link, a malware dropper, or a clean document. The result was a binary verdict of "unknown," which most Secure Email Gateways treat as "allow."
The 2025 Verizon Data Breach Investigations Report found that phishing remained the top initial access vector in breaches, with attachment-based delivery persisting as a significant subset. Password protection adds a layer that turns "detected and blocked" into "scanned and passed."
See Your Risk: Calculate how many threats your SEG is missing right now
Legitimate Infrastructure, Illegitimate Intent
The authentication results on this email were spotless. SPF passed against Microsoft's protection[.]outlook[.]com. DKIM signatures validated. DMARC aligned. ARC headers confirmed a clean relay chain through Microsoft's Exchange Online Protection infrastructure. There was no IP mismatch, no header spoofing, no domain impersonation.
This is the signature of account compromise (MITRE T1078, Valid Accounts), not spoofing. The attacker had access to a real account on a real government education domain and used Microsoft's own mail infrastructure to deliver the payload. Every authentication protocol did exactly what it was designed to do: verify that the email came from authorized infrastructure. None of them are designed to evaluate what the email is asking the recipient to do.
One additional anomaly confirmed the compromise theory. The sender's email address did not match the contact email listed in the signature block. The "from" address belonged to one staff member, but the signature referenced a completely different person's contact information. This kind of identity mismatch is a hallmark of a hijacked account where the attacker either cannot modify the signature or does not realize it does not match.
The email also included 10 hyperlinks, all pointing to legitimate government websites. The state department of education. A regional academy. Real organizations, real URLs, real destinations. Attackers seeded the email with verifiable legitimate links to build trust, while the actual payload sat locked inside the PDF attachment. According to IBM's 2024 Cost of a Data Breach Report, compromised credentials remain the most common initial attack vector, with an average breach cost of $4.81 million.
How Community Intelligence Caught What Scanners Couldn't
IRONSCALES' Adaptive AI assigned this email a Themis confidence score of 50, which is notable because it reflects a community-driven detection rather than a content-based one. The attack was explicitly designed to look legitimate. Clean authentication. Government branding. Real links. Professional tone. Content analysis alone would not catch this.
What triggered detection was behavioral. First-time sender to this organization. Cross-sector communication pattern outside the law firm's normal correspondence graph. Password-protected attachment paired with an in-body passcode (a pattern that IRONSCALES community intelligence has seen reported across thousands of organizations). The combination of these signals, none of which required opening the PDF, was enough to quarantine the email across two affected mailboxes before any recipient engaged with the attachment.
This is the fundamental gap in scanner-dependent security architectures. When the file cannot be opened, the authentication is clean, and the links are legitimate, the only signals left are behavioral. Who is sending this? Have they ever contacted this organization? Does the attachment pattern match known evasion techniques? Those are questions that require context beyond a single email, and context is exactly what community-driven threat intelligence provides.
What Security Teams Should Do Now
Password-protected PDF attacks are not sophisticated. They are effective because they exploit a known, unpatched limitation in how email security stacks process attachments. Here is what reduces the risk.
- Flag passcode-plus-attachment patterns. Any email containing both a password-protected file and the password in the body should trigger investigation. This is not normal business communication at scale.
- Stop trusting authentication alone. SPF, DKIM, and DMARC verify infrastructure, not intent. Compromised accounts pass every check. Layer behavioral AI analysis on top of authentication.
- Treat first-time senders with protected attachments as high-risk. A new sender delivering a locked file with instructions to open it is the phishing equivalent of a stranger handing you a sealed envelope and whispering the combination.
- Deploy community-sourced threat intelligence. When 35,000+ security professionals across the IRONSCALES community report the same attachment pattern, that signal reaches your inbox before the next campaign does.
- Audit .gov and .edu account security. Government and education domains carry implicit trust, which is exactly why attackers target them. Compromised accounts on trusted domains are the highest-value phishing infrastructure available.
The FBI's 2024 Internet Crime Report documented $2.77 billion in BEC losses alone. The attacks generating those numbers did not need zero-day exploits or novel malware. They needed a compromised account, a locked PDF, and a nine-digit passcode.
Try It Free: Start your IRONSCALES free trial and stop what your gateway can't see
| Type | Indicator | Context |
|---|---|---|
| Attachment | Georgia Department of Education_protected.pdf | Password-protected PDF payload (112KB) |
| Attachment | image001.png | Department branding image for legitimacy (112KB) |
| Domain | gabmacon[.]org | Legitimate government domain used in body links |
| Domain | gadoe[.]org | Legitimate state education domain used in body links |
| Passcode | 0937728736 | PDF unlock passcode provided in email body |
| Technique | BCC bulk distribution | Email sent TO self, targets BCC'd |
| Technique | Sender/signature mismatch | From address does not match signature contact |
Explore More Articles
Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.