Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Zendesk Customer Configurations Exploited for Massive Email Bomb Attacks
Advertisements

Widespread Abuse of Unverified Support Tickets

Cybercriminals have found a way to weaponize the popular customer service platform Zendesk, launching massive email bombing campaigns by exploiting a common configuration weakness. The attack method allows malicious actors to flood a target’s inbox with thousands of automated support ticket notifications that appear to come from hundreds of legitimate corporate brands, including well-known names like Discord, The Washington Post, and NordVPN.

The core of the issue lies not in Zendesk’s platform itself, but in how its corporate customers configure their support portals. Many companies allow anyone, including anonymous users, to submit a support request without first verifying their email address. Attackers abuse this by programmatically submitting countless tickets across hundreds of different company portals, all using the victim’s email address as the submitter.

Lax Authentication Enables Harassment

Each time a ticket is submitted, the company’s Zendesk instance automatically sends a “ticket created” notification to the email address provided. Because the emails are sent directly from the company’s domain (e.g., support@company.com), they bypass spam filters and appear legitimate. This distributed technique allows attackers to rapidly overwhelm an inbox with messages containing harassing or menacing subject lines of their choosing.

In a statement, Zendesk acknowledged the abuse and confirmed it stems from customers who choose to allow unverified ticket submissions for their own business reasons. While the company recommends its clients configure an authenticated workflow, it is not a mandatory setting. Zendesk stated its rate-limiting systems were ineffective against this distributed attack and that it is investigating additional preventive measures. Ultimately, this incident highlights the security risks of failing to validate user email addresses before sending automated communications.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading