Massive Phishing Campaign Targets Yahoo Using Client’s Domain

September 28, 2025

Unauthorized infrastructure and DKIM abuse allowed a sudden spike in spoofed emails, highlighting risks in client email security.

Massive Phishing Campaign Targets Yahoo Using Client’s Domain

72,804 phishing emails were sent from our past client’s domain, targeting Yahoo users.

All messages originated from the Indonesian server cancerglobal[.]my[.]id and were signed with addonnetworks[.]com, which appears linked to AddOn Networks

This suggests unauthorized use of AddOn Networks’ infrastructure or potential abuse of their DKIM signing system.

SPF authentication passed for cancerglobal[.]my[.]id but failed alignment with the client’s domain. DKIM validation failed, as the signing domain did not match the legitimate public key published by the client. DMARC failed for all messages, but the emails still went through due to DMARC being set to p=none monitoring.

Sharp increase from the 17 spoofed attempts last April to about 73,000 within a short window, indicating a large-scale automated phishing operation pattern.

Screenshot powered by URIports.

Related posts
All posts
Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise

A scam email sent from @google.com passed SPF, DKIM, and DMARC without a compromised account. Here’s what it reveals about modern email threats.

Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise
When Vendors Control Your DNS: A Hidden DMARC Security Risk

A real-world example of how third-party DNS control can silently block DMARC visibility, redirect domain telemetry, and introduce serious email security and data exposure risks.

When Vendors Control Your DNS: A Hidden DMARC Security Risk
2.3 million emails. One exposed API key. $10K bill.

How DMARC forensics exposed an API key leak, 2.3M unauthorized emails, and a $10K bill.

2.3 million emails. One exposed API key. $10K bill.