Table of Contents
11:05 AM on a Friday: A Work Order Arrives
The email landed in four inboxes at a regional broadband provider just before lunch on a Friday. It looked like every other work order the operations team had seen that week: a telecom vendor requesting confirmation of a cable drop installation at a residential address. Ticket number, equipment specs, a construction due date. Routine.
The subject line read "Request # 351426" with a street address. The body listed copper drop specifications, a cost center, a pedestal number. At the bottom, a single instruction: "Please reply all to this email to accept and confirm receipt of this drop request."
No link to click. No attachment to open. No credential form. No urgency language. No financial ask.
Just "reply all."
That was the entire attack.
The Perfect Disguise Is No Disguise at All
What made this email dangerous was how aggressively normal it was. The sender, an employee at a legitimate telecom company, used a real corporate email address. The message passed SPF, DKIM, and DMARC authentication. Every cryptographic signature checked out. Every relay hop traced back through Microsoft's own Exchange Online infrastructure.
The work order format was pixel-perfect. MetaSolv ticket numbers, exchange head-end references, DSA codes, pedestal identifiers. These are not details you guess. They come from someone who has (or had) access to real telecom provisioning systems.
And that is exactly the point. This was almost certainly a compromised account inside a legitimate vendor's Microsoft 365 tenant. The attacker did not need to spoof anything. They were sending from the real thing.
The recipient list was also telling. The email went to multiple employees at the broadband provider, a shared Gmail address, and a contractor's domain. The same list appeared twice in the To: field (a subtle copy-paste artifact that a legitimate automated system would not produce). The original message came from a "Net Ops Reporting" mailbox, but the reply came from an individual employee's account. Two different sending identities, same thread. That mismatch is the kind of detail that disappears when you are scanning fifty emails before lunch.
What the Attacker Was Actually After
This is a reconnaissance operation, not a payload delivery. The attacker's goal was not to steal credentials or deploy malware in this message. It was to answer three questions:
- Which of these mailboxes are alive? A reply confirms the address is active, monitored, and staffed by someone who responds to vendor requests.
- Who responds to operational requests? Reply-all responses expose names, titles, email signatures, phone numbers, and organizational hierarchy.
- What does legitimate vendor communication look like here? Every reply teaches the attacker how this organization formats responses, which employees handle which workflows, and what level of detail triggers action.
This maps directly to MITRE ATT&CK T1589.002 (Gather Victim Identity Information: Email Addresses) and T1586.002 (Compromise Accounts: Email Accounts). The compromised vendor account itself is a textbook example of T1078 (Valid Accounts), where legitimate credentials are used to conduct malicious activity.
The beauty of this approach (from the attacker's perspective) is deniability. If the organization's security team reviews this email after the fact, it looks like a legitimate work order. No malicious indicators. No IOCs to block. The attack leaves almost no forensic footprint because the email itself is not malicious. The information gathered from the reply is.
See Your Risk: Calculate how many threats your SEG is missing
Where the Story Changes
Here is where it gets interesting. Every traditional security control passed this email. SPF, DKIM, DMARC: all green. No links to scan. No attachments to detonate. No known-bad sender reputation. A secure email gateway evaluating this message would have exactly zero signals to act on.
IRONSCALES Themis AI flagged it anyway.
The detection was not based on content signatures or URL scanning. Themis identified a cluster of behavioral signals that, individually, look harmless but together paint a different picture. The sender was a first-time contact to this organization. The email was sent to an unusual mix of internal and external recipients. The language patterns, while operationally plausible, matched structures commonly seen in sophisticated phishing attempts. And the requested action (reply all to a cross-organizational distribution list) is a known reconnaissance technique.
Four affected mailboxes were quarantined before any employee could reply. The system reverted the messages automatically. No mailbox confirmation was sent back to the attacker.
The difference between "this is fine" and "this is reconnaissance" came down to behavioral context that no authentication protocol was designed to catch.
When the Payload Is the Reply
Security teams spend enormous resources scanning links and detonating attachments. That focus is necessary. But it creates a blind spot for emails that carry no payload at all.
According to the FBI IC3 2024 Annual Report, business email compromise remains the costliest category of cybercrime, with losses exceeding $2.9 billion. Many of those attacks begin exactly like this: a benign-looking email from a compromised vendor account, testing which doors are open before walking through them.
The Verizon 2024 DBIR found that pretexting (social engineering without a technical payload) is now involved in more than 40% of BEC incidents. Zero-payload reconnaissance is not a niche technique. It is the opening move in the most expensive attack category in cybersecurity.
Three things to take from this case:
Treat reply-all requests from external senders as a security event, not a workflow task. Especially when the sender is new to your organization. Validate the request through an out-of-band channel (pick up the phone) before responding.
Audit your vendor communication patterns. If your operations team regularly receives work orders from external partners, establish a baseline. When a new sender appears in an established workflow, that should trigger a review, not a reflexive reply.
Accept that authentication is not authorization. SPF, DKIM, and DMARC tell you the email came from who it claims. They do not tell you whether that person's account has been compromised. Behavioral AI analysis that evaluates sender patterns, recipient context, and communication anomalies is the layer that catches what authentication cannot.
The most dangerous email in your inbox today might not have a link in it at all.
Indicators of Compromise
| Type | Indicator | Context |
|---|---|---|
| Sender Address | Conner[.]DiPersio@tdstelecom[.]com |
Likely compromised vendor account, first-time sender to target org |
| Sender Domain | tdstelecom[.]com |
Legitimate TDS Telecom domain, SPF/DKIM/DMARC passing |
| Reply-To Pattern | Reply-all to mixed internal/external distribution list | Reconnaissance technique to harvest active mailboxes |
| Relay Infrastructure | PH0PR01MB7473[.]prod[.]exchangelabs[.]com |
Microsoft 365 Exchange Online (legitimate infrastructure) |
| Behavioral Signal | Duplicate recipient list in To: field | Copy-paste artifact inconsistent with automated ticketing systems |
Explore More Articles
Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.