Threat Intelligence

Authenticated Dutch Email from WBG Pooling Carries Undecodable Barcode in Signature Image

Written by Audian Paxson | Dec 4, 2025 5:45:00 AM
TL;DR An email from wbg-pooling[.]eu (a legitimate German logistics and pooling company) passed SPF and DKIM authentication. The message included a JPEG signature image containing a barcode that could not be decoded by standard barcode analysis tools. The contact name listed in the signature could not be verified through public business records or LinkedIn. This was a first-time sender to the target organization with no prior communication history.

What Happened

An email arrived from wbg-pooling[.]eu, a domain belonging to a legitimate German logistics company that provides pooling and container management services. SPF passed. DKIM passed. The sending infrastructure was consistent with the domain registration and the company business profile.

The email included a JPEG signature image that contained an embedded barcode. When the barcode was analyzed with standard decoding tools, it could not be read. The barcode format did not match common symbologies (Code 128, QR, EAN, Data Matrix), and no data payload could be extracted from the image.

The signature listed the contact name "Marie-Chantal Hackstedt." A search through public business registries, LinkedIn, and company directories returned no verifiable match for this individual at WBG Pooling or related entities. The name could not be confirmed as a real employee.

This was a first-time sender. The domain wbg-pooling[.]eu had never previously communicated with the target organization through any channel tracked by the email security platform.

Why It Matters

The combination of a legitimate domain, passing authentication, and professional formatting creates an email that clears every automated checkpoint. The barcode in the signature image adds a layer of concern that traditional email gateway security cannot evaluate. Text-based content analysis reads the email body and headers, but the barcode exists purely as image data. Without optical recognition and barcode-specific decoding, the content of the barcode is invisible to the scanning pipeline.

An undecodable barcode has multiple possible explanations. It could be a proprietary internal tracking code used by the company. It could be a decorative element scraped from a real signature and re-embedded in a spoofed template. Or it could be deliberately encoded with a non-standard symbology to carry data that only specific reader applications can interpret.

The unverifiable contact name adds a second behavioral anomaly. Legitimate business communications from established companies typically come from employees who have some discoverable public presence. When the sender name cannot be confirmed through any public directory, the email loses the implicit trust that a known-sender relationship provides.

How IRONSCALES Caught It

Adaptive AI email security flagged this message through first-time sender detection. Despite the passing authentication and legitimate domain, the absence of any prior communication between wbg-pooling[.]eu and the target organization elevated the risk score. The unverifiable contact name and the presence of an image-embedded barcode that could not be decoded provided additional behavioral signals that reinforced the HIGH risk classification.

The community intelligence network was consulted but had not yet seen this specific sender pattern across other tenants. The risk assessment was driven entirely by behavioral analysis at the individual organization level.

See Your Risk. Run a free phishing simulation to test whether first-time sender emails from legitimate domains would reach your users unscrutinized.

Indicators of Compromise

IndicatorTypeValue
Case IDInternala7fe490d0bba6b688e7c32a75811109d
Sender DomainDomainwbg-pooling[.]eu
Domain OriginWHOISGermany
Contact NameIdentityMarie-Chantal Hackstedt (unverifiable)
Signature ImageAttachmentJPEG with embedded barcode
Barcode StatusAnalysisUndecodable
First-Time SenderBehavioralYes
SPFAuthenticationpass
DKIMAuthenticationpass

MITRE ATT&CK Mapping

TacticTechniqueIDNotes
ReconnaissanceGather Victim Identity InformationT1589First-time sender probing organizational responsiveness
Defense EvasionObfuscated Files or InformationT1027Undecodable barcode embedded in signature image
Initial AccessPhishingT1566Authenticated email from legitimate domain
Resource DevelopmentEstablish AccountsT1585Unverifiable contact identity at real company
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.