Backscatter Injection Attacks Exploiting Legitimate Infrastructure

January 8, 2026

Backscatter injection attacks exploit non-compliant domains to deliver phishing payloads via legitimate bounce-back messages, polluting inboxes and server infrastructure.

Backscatter Injection Attacks Exploiting Legitimate Infrastructure

Backscatter injection attacks have been hitting our clients more frequently recently.

These emails often bypass spam filters because they appear to come from legitimate infrastructure like mailer-daemon[at]googlemail[.]com.

In reality, they’re bounce-back notifications intentionally triggered by attackers.

They spoof domains without DMARC p=reject, send phish to non-existent recipients, and let mail servers generate NDRs that deliver the payload.

When bounce messages include the original content, the mail server becomes a phishing relay.

This damages mail server's infrastructure, pollutes inboxes, and lets phish to go through putting risks at its users.

And the worst thing is that Gmail users are mostly just passengers, with very little control.

Related posts
All posts
Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise

A scam email sent from @google.com passed SPF, DKIM, and DMARC without a compromised account. Here’s what it reveals about modern email threats.

Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise
When Vendors Control Your DNS: A Hidden DMARC Security Risk

A real-world example of how third-party DNS control can silently block DMARC visibility, redirect domain telemetry, and introduce serious email security and data exposure risks.

When Vendors Control Your DNS: A Hidden DMARC Security Risk
2.3 million emails. One exposed API key. $10K bill.

How DMARC forensics exposed an API key leak, 2.3M unauthorized emails, and a $10K bill.

2.3 million emails. One exposed API key. $10K bill.