<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Email — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/email/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 10:49:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/email/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in Mutt Email Client Lead to Potential DoS</title><link>https://feed.craftedsignal.io/briefs/2026-05-mutt-dos/</link><pubDate>Mon, 04 May 2026 10:49:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mutt-dos/</guid><description>A remote, anonymous attacker can exploit multiple vulnerabilities in mutt to bypass security measures and cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities in the mutt email client allow a remote, anonymous attacker to bypass security measures and potentially cause a denial-of-service (DoS) condition. While specific details regarding the vulnerabilities are not provided in the source, the advisory indicates a risk of exploitation that could disrupt email services for users of the mutt client. The lack of CVEs or specific techniques suggests a potential zero-day or newly discovered flaw. This poses a risk to organizations relying on mutt for email communications, especially if security measures are not up-to-date or properly configured. The scope of targeting is broad, affecting any user of the mutt email client.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of the mutt email client.</li>
<li>The attacker crafts a malicious email or other input designed to trigger a vulnerability in mutt.</li>
<li>The malicious input is sent to a user of the mutt email client.</li>
<li>The user opens the email or processes the malicious input, causing the mutt client to parse the data.</li>
<li>The vulnerability is triggered, potentially leading to memory corruption, code execution, or resource exhaustion.</li>
<li>If the vulnerability leads to resource exhaustion, the mutt client becomes unresponsive, denying service to the user.</li>
<li>Repeated exploitation of the vulnerability can lead to a sustained denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to a denial-of-service condition for users of the mutt email client. This can disrupt email communications and potentially lead to loss of productivity. The advisory does not specify the number of victims or sectors targeted, but the impact could be widespread given the popularity of the mutt client among certain user groups. The lack of specific CVEs makes it difficult to assess the severity of the impact, but the potential for DoS warrants immediate attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for patterns indicative of denial-of-service attacks targeting systems running the mutt email client.</li>
<li>Implement rate limiting and traffic filtering to mitigate the impact of potential DoS attacks.</li>
<li>Since the source does not include specific IOCs, focus on generic DoS detection strategies tailored to email protocols.</li>
<li>Investigate and apply any available patches or updates for mutt from the vendor to address the underlying vulnerabilities once they are published.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>denial-of-service</category><category>email</category></item><item><title>Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption</title><link>https://feed.craftedsignal.io/briefs/2026-05-email-phishing-trends/</link><pubDate>Thu, 30 Apr 2026 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-email-phishing-trends/</guid><description>In Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.</description><content:encoded><![CDATA[<p>In the first quarter of 2026, Microsoft Threat Intelligence observed a significant rise in email-based phishing threats, totaling approximately 8.3 billion. This increase was driven by surges in QR code phishing (more than doubling over the period), CAPTCHA-gated phishing, and credential phishing attacks. Microsoft&rsquo;s Digital Crime Unit successfully disrupted the Tycoon2FA phishing-as-a-service (PhaaS) platform in early March, leading to a 15% reduction in associated email volume. However, threat actors adapted by shifting hosting providers and domain registration patterns. Business email compromise (BEC) also remained a prevalent threat, with approximately 10.7 million attacks recorded during the quarter, often characterized by low-effort, generic outreach messages. Microsoft Defender Research has also noted the emergence of AI-enabled device code phishing campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Email Delivery:</strong> Attackers send phishing emails impersonating legitimate services or organizations. These emails may contain links, QR codes, or HTML attachments.</li>
<li><strong>Victim Interaction:</strong> The victim opens the email and clicks on a malicious link or scans a QR code, redirecting them to a phishing page.</li>
<li><strong>Phishing Page Redirection:</strong> The phishing page mimics a legitimate login portal, such as Microsoft 365 or other enterprise applications.</li>
<li><strong>Credential Harvesting:</strong> The victim enters their username and password on the phishing page, which are then captured by the attacker.</li>
<li><strong>MFA Bypass (AiTM):</strong> For attacks using adversary-in-the-middle (AiTM) techniques (like those facilitated by Tycoon2FA), the attacker intercepts the MFA code and uses it to authenticate.</li>
<li><strong>Account Compromise:</strong> With the stolen credentials and MFA code (if applicable), the attacker gains unauthorized access to the victim&rsquo;s account.</li>
<li><strong>Lateral Movement/Data Theft:</strong> The attacker uses the compromised account to access sensitive data, send further phishing emails, or move laterally within the organization.</li>
<li><strong>Business Email Compromise:</strong> In BEC attacks, attackers use compromised accounts or spoofed email addresses to send fraudulent invoices or requests for wire transfers.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The observed email threats in Q1 2026 led to a high risk of credential compromise, financial loss through BEC attacks, and potential data breaches across various sectors. Although the total number of victims is not specified, the billions of phishing attempts indicate a widespread impact. Microsoft&rsquo;s disruption of Tycoon2FA temporarily reduced phishing volumes by 15%, demonstrating the potential for proactive intervention to mitigate these threats. However, threat actors are quickly adapting their techniques, indicating the need for continued vigilance and enhanced security measures. The 10.7 million BEC attacks alone represent a significant financial threat to businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect Tycoon2FA Phishing Attempts&rdquo; Sigma rule to identify email campaigns associated with the Tycoon2FA platform.</li>
<li>Enable Microsoft Defender detections to improve detection of phishing emails and malicious payloads.</li>
<li>Monitor email traffic for suspicious domain registrations, particularly those using newer generic top-level domains (TLDs) such as .DIGITAL, .BUSINESS, .CONTRACTORS, .CEO, and .COMPANY, and the resurgence of .RU registrations, to identify potential Tycoon2FA infrastructure shifts.</li>
<li>Educate users about the dangers of QR code phishing and CAPTCHA-gated attacks, emphasizing the importance of verifying the legitimacy of login pages and email senders, to reduce the effectiveness of phishing campaigns (T1566).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>email</category><category>phishing</category><category>credential-theft</category><category>Tycoon2FA</category><category>BEC</category></item><item><title>Apple Account Notification Phishing Campaign</title><link>https://feed.craftedsignal.io/briefs/2026-04-apple-phishing/</link><pubDate>Sun, 19 Apr 2026 16:03:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-apple-phishing/</guid><description>A phishing campaign is abusing legitimate Apple account change notifications to deliver fake iPhone purchase scams, tricking users into calling malicious support numbers.</description><content:encoded><![CDATA[<p>A phishing campaign is underway that abuses Apple&rsquo;s account change notification system. Threat actors are inserting phishing messages into the first and last name fields of Apple ID accounts. By modifying the account&rsquo;s shipping information, they trigger legitimate Apple security alerts, which then embed the malicious message within the email body. The emails appear to originate from <a href="mailto:appleid@id.apple.com">appleid@id.apple.com</a> and pass SPF, DKIM, and DMARC checks, making them more likely to bypass spam filters. This campaign is designed to trick recipients into believing their accounts have been used for fraudulent purchases, scaring them into calling a scammer&rsquo;s &ldquo;support&rdquo; number.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates an Apple ID using a burner email address.</li>
<li>The attacker enters a phishing lure (e.g., &ldquo;Dear User 899 USD iPhone Purchase Via Pay-Pal To Cancel&rdquo;) split across the first and last name fields in the Apple ID profile, as these fields have character limits.</li>
<li>The attacker modifies the account&rsquo;s shipping information.</li>
<li>This triggers an Apple account profile change notification email.</li>
<li>Apple sends a legitimate security alert notifying the user of the change, embedding the attacker-controlled first and last name fields within the email body. The email originates from <a href="mailto:appleid@id.apple.com">appleid@id.apple.com</a>.</li>
<li>The recipient receives the email, which appears legitimate and contains a phishing message and a callback number (e.g., 18023530761).</li>
<li>The recipient, believing their account has been compromised, calls the provided number.</li>
<li>The scammers attempt to convince the victim that their account has been compromised and may instruct them to install remote access software or provide financial information to &ldquo;resolve&rdquo; the issue, leading to financial theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to financial theft, malware deployment, or data theft. Victims who call the provided number are at risk of being coerced into providing sensitive information or installing remote access software, giving the attackers full control over their devices and accounts. The specific number of victims is currently unknown, but the campaign&rsquo;s use of legitimate Apple infrastructure increases its potential reach and impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting emails originating from Apple infrastructure (<a href="mailto:appleid@id.apple.com">appleid@id.apple.com</a>) containing suspicious phone numbers to your SIEM.</li>
<li>Monitor for emails originating from <code>appleid@id.apple.com</code> that contain phone numbers in the email body and consider blocking the identified number <code>18023530761</code>.</li>
<li>Educate users to treat unexpected account alerts claiming purchases or urging them to call support numbers with extreme caution, especially if they did not initiate any recent changes.</li>
<li>Review email gateway logs for emails originating from <code>appleid@id.apple.com</code> and <code>uatdsasadmin@email.apple.com</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>apple</category><category>phishing</category><category>callback phishing</category><category>email</category></item><item><title>Outlook Security Settings Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-outlook-registry-security-settings/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-outlook-registry-security-settings/</guid><description>Attackers modify Outlook security settings via registry changes to enable malicious mail rules and bypass security controls, potentially leading to persistence and data compromise.</description><content:encoded><![CDATA[<p>Attackers are known to modify Outlook security settings by directly manipulating registry values. This tactic allows them to bypass built-in security controls and enable potentially malicious functionalities such as running unsafe mail client rules. This circumvention of security measures can be leveraged for various malicious purposes, including persistence, data exfiltration, and further compromise of the victim&rsquo;s system. The specific registry keys targeted reside under <code>\SOFTWARE\Microsoft\Office\Outlook\Security\</code>. This technique has been observed in various attack scenarios and poses a significant risk to organizations relying on Outlook for email communication. The modification of these registry settings may be performed by various means, ranging from manually executed commands to automated scripts deployed as part of a larger attack campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through methods such as phishing or exploiting vulnerabilities.</li>
<li>The attacker establishes persistence on the compromised system.</li>
<li>The attacker identifies the specific registry keys controlling Outlook security settings, located under <code>\SOFTWARE\Microsoft\Office\Outlook\Security\</code>.</li>
<li>The attacker uses a command-line tool or script (e.g., <code>reg.exe</code>, PowerShell) to modify the registry values related to Outlook security settings.</li>
<li>Specifically, values are modified to enable the execution of &ldquo;unsafe&rdquo; mail client rules, potentially allowing arbitrary code execution via crafted emails.</li>
<li>The attacker crafts a malicious email designed to trigger the newly enabled, unsafe mail rules.</li>
<li>Upon receiving the email, Outlook processes the rules, executing the attacker&rsquo;s payload.</li>
<li>The attacker achieves code execution, enabling further malicious activities, such as data exfiltration or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Outlook security settings allows attackers to execute arbitrary code within the context of the user account running Outlook. This can lead to the compromise of sensitive information contained within emails, the installation of malware, and further propagation of the attack throughout the organization. The scope of the impact depends on the privileges of the user account and the attacker&rsquo;s objectives, potentially affecting all users within an organization if the attacker gains domain administrator access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Outlook Security Settings Updated - Registry&rdquo; to your SIEM to detect unauthorized modifications to Outlook security-related registry keys (logsource: registry_set/windows).</li>
<li>Monitor process creation events for suspicious processes (e.g., <code>reg.exe</code>, <code>powershell.exe</code>) modifying registry keys under <code>\SOFTWARE\Microsoft\Office\Outlook\Security\</code> (Sigma rule below, logsource: process_creation/windows).</li>
<li>Implement strict application control policies to prevent unauthorized execution of scripts and executables that could be used to modify registry settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>registry_modification</category><category>outlook</category><category>email</category></item></channel></rss>