Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections
Briefly

Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns.
Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious.
One such campaign, active since at least December 2022, involves distributing email messages with attachments containing QR codes that lead to phishing sites.
The phishing site, in one case, urged users to enter their identification and card details, and then make a fraudulent payment to the attacker.
Read at The Hacker News
[
|
]