Backscatter Injection Attacks Exploiting Legitimate Infrastructure

January 8, 2026

Backscatter injection attacks exploit non-compliant domains to deliver phishing payloads via legitimate bounce-back messages, polluting inboxes and server infrastructure.

Backscatter Injection Attacks Exploiting Legitimate Infrastructure

Backscatter injection attacks have been hitting our clients more frequently recently.

These emails often bypass spam filters because they appear to come from legitimate infrastructure like mailer-daemon[at]googlemail[.]com.

In reality, they’re bounce-back notifications intentionally triggered by attackers.

They spoof domains without DMARC p=reject, send phish to non-existent recipients, and let mail servers generate NDRs that deliver the payload.

When bounce messages include the original content, the mail server becomes a phishing relay.

This damages mail server's infrastructure, pollutes inboxes, and lets phish to go through putting risks at its users.

And the worst thing is that Gmail users are mostly just passengers, with very little control.

Related posts
All posts
Coordinated Subdomain Takeover Campaign Targeting US Universities

Attackers are hijacking abandoned .edu subdomains via orphaned CNAME records, serving spam under trusted university domains and exploiting SEO authority.

Coordinated Subdomain Takeover Campaign Targeting US Universities
Cloudflare's DMARC Documentation Exposed an Unregistered Domain And Dozens of Organizations Paid the Price

How an unregistered domain in Cloudflare's DMARC documentation silently exposed infrastructure data from dozens of organizations.

Cloudflare's DMARC Documentation Exposed an Unregistered Domain And Dozens of Organizations Paid the Price
FinTech AccessPay Exposed Internal Email Infrastructure Data for Years

A misconfigured DMARC record sent sensitive email infrastructure data to an unregistered domain, creating a long-term exposure risk.

FinTech AccessPay Exposed Internal Email Infrastructure Data for Years