Mystified as to how this was potential, Guardio seen that the phishing emails all originated on an SMTP digital server routed by way of Office365 On-line Change earlier than coming into a domain-specific relay server operated by Proofpoint.
Importantly, that last Proofpoint server was the place the DKIM and SPF authenticity can be handed as authentic, primarily permitting it to route emails on behalf of its prospects.
“EchoSpoofing”
The bypass turned out to have two elements to it. The primary was to beat the SPF IP-to-domain test, which was achieved by sending their spoofed emails from an SMTP server of their management by means of an Office365 account. This stops spoofing when e-mail originates on these accounts however not, crucially, when relaying emails from exterior SMTP servers.