Taulia Supplier Portal Impersonation with Footer Address Mismatch via Amazon SES

TL;DR A payment notification impersonating the Taulia supplier portal arrived from suppliermail.dfamilk[.]com via Amazon SES with full SPF, DKIM, and DMARC authentication. The email referenced a payment for DFA with a redacted amount. A footer address mismatch (95 3rd St vs the real Taulia address at 795 Folsom) and duplicated template blocks revealed the impersonation. All embedded links pointed to real Taulia subdomains, making URL-based detection ineffective.

What Happened

A payment notification arrived claiming to be from the Taulia supplier portal, a legitimate supply chain finance platform used by enterprise organizations to manage supplier payments. The email was sent from suppliermail.dfamilk[.]com via Amazon SES and passed SPF, DKIM, and DMARC authentication without any failures.

The notification referenced a payment for DFA (Dairy Farmers of America) with a redacted payment amount. Every link in the email body pointed to real Taulia subdomains. The formatting matched legitimate Taulia payment notifications closely enough to pass visual inspection.

Two anomalies revealed the impersonation. First, the footer address listed 95 3rd St, while the real Taulia corporate address is 795 Folsom. Second, the email contained duplicated template blocks where sections of the notification were repeated, a common artifact of copy-paste template construction rather than programmatic template rendering.

Why It Matters

Supplier portal impersonation targets the payment workflow directly. When a finance team receives what appears to be a legitimate payment notification from a platform they already use, the natural response is to click through and process the payment. The attacker does not need to convince the recipient that a new vendor exists or that an unusual payment is justified. They simply need to replicate an existing, expected communication.

The use of real Taulia subdomains for all embedded links makes URL-based detection ineffective. Every link in the email resolves to a legitimate Taulia domain. Scanners that evaluate link destinations find no malicious infrastructure. The fraud is embedded in the context of the notification itself, not in the payload.

Amazon SES as the sending infrastructure provides full authentication coverage. The attacker configured SPF and DKIM correctly for the dfamilk[.]com subdomain, and DMARC alignment passed. From an email authentication perspective, this email is indistinguishable from a legitimate automated notification.

How IRONSCALES Caught It

Adaptive AI email security identified the behavioral anomaly: a supplier portal notification arriving from a subdomain (suppliermail.dfamilk[.]com) that had no established communication pattern with the target organization. The footer address mismatch and duplicated template blocks provided additional confidence signals that the template was constructed rather than generated by the real Taulia platform.

Community intelligence across the IRONSCALES network confirmed that multiple organizations received similar Taulia impersonation notifications from the same sending infrastructure, establishing the campaign pattern.

See Your Risk. Run a free phishing simulation to test whether supplier portal impersonation emails would reach your finance team.

Indicators of Compromise

IndicatorTypeValue
Case IDInternalccfdc47c3cf23e49fff1b6d021fad3ba
Sender DomainDomainsuppliermail.dfamilk[.]com
Impersonated PlatformBrandTaulia
Payment EntityOrganizationDFA
ESPInfrastructureAmazon SES
Footer Address (Fake)Template Anomaly95 3rd St
Footer Address (Real)Reference795 Folsom
Template AnomalyIndicatorDuplicated template blocks
SPFAuthenticationpass
DKIMAuthenticationpass
DMARCAuthenticationpass

MITRE ATT&CK Mapping

TacticTechniqueIDNotes
Initial AccessPhishing: Spearphishing LinkT1566.002Payment notification with portal links
Defense EvasionMasqueradingT1036Taulia supplier portal template impersonation
Defense EvasionTrusted RelationshipT1199All links to legitimate Taulia subdomains
ImpactFinancial TheftT1657Payment diversion through supplier portal workflow
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.

Explore More Articles

Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.