``` Zendesk 身份验证漏洞导致邮件炸弹攻击 ```
Email bombs exploit lax authentication in Zendesk

原始链接: https://krebsonsecurity.com/2025/10/email-bombs-exploit-lax-authentication-in-zendesk/

## Zendesk 滥用导致电子邮件泛滥 网络罪犯正在利用 Zendesk(一个流行的客户服务平台)中的安全漏洞,向收件箱发送恶意信息。问题在于 Zendesk 客户允许匿名用户提交支持请求*而无需*电子邮件验证。 攻击者利用这一点发送威胁或侮辱性的电子邮件,这些邮件看似来自数百家合法的 Zendesk 客户——包括 Discord、NordVPN 和 *《华盛顿邮报》* 等大型公司。这些电子邮件并非*由* Zendesk 发送,而是通过受损客户帐户的自动化通知系统发送的。 Zendesk 承认了这个问题,表示一些客户优先考虑易于访问而非安全性。虽然存在速率限制,但它们未能阻止大规模滥用。该公司正在进一步调查预防措施,并建议客户要求对工单提交进行电子邮件身份验证,以防止品牌损害和破坏性的电子邮件泛滥。本质上,匿名提交的便利性正在被武器化用于恶意目的。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 电子邮件炸弹利用 Zendesk 宽松的身份验证 (krebsonsecurity.com) 6 分,by todsacerdoti 2 小时前 | 隐藏 | 过去 | 收藏 | 1 条评论 dboreham 9 分钟前 [–] 啊。这解释了我上周同时收到的许多奇怪邮件。回复 考虑申请 YC 2026 冬季批次!申请截止至 11 月 10 日 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文

Cybercriminals are abusing a widespread lack of authentication in the customer service platform Zendesk to flood targeted email inboxes with menacing messages that come from hundreds of Zendesk corporate customers simultaneously.

Zendesk is an automated help desk service designed to make it simple for people to contact companies for customer support issues. Earlier this week, KrebsOnSecurity started receiving thousands of ticket creation notification messages through Zendesk in rapid succession, each bearing the name of different Zendesk customers, such as CapCom, CompTIA, Discord, GMAC, NordVPN, The Washington Post, and Tinder.

The abusive missives sent via Zendesk’s platform can include any subject line chosen by the abusers. In my case, the messages variously warned about a supposed law enforcement investigation involving KrebsOnSecurity.com, or else contained personal insults.

Moreover, the automated messages that are sent out from this type of abuse all come from customer domain names — not from Zendesk. In the example below, replying to any of the junk customer support responses from The Washington Post’s Zendesk installation shows the reply-to address is [email protected].

One of dozens of messages sent to me this week by The Washington Post.

Notified about the mass abuse of their platform, Zendesk said the emails were ticket creation notifications from customer accounts that configured their Zendesk instance to allow anyone to submit support requests — including anonymous users.

“These types of support tickets can be part of a customer’s workflow, where a prior verification is not required to allow them to engage and make use of the Support capabilities,” said Carolyn Camoens, communications director at Zendesk. “Although we recommend our customers to permit only verified users to submit tickets, some Zendesk customers prefer to use an anonymous environment to allow for tickets to be created due to various business reasons.”

Camoens said requests that can be submitted in an anonymous manner can also make use of an email address of the submitter’s choice.

“However, this method can also be used for spam requests to be created on behalf of third party email addresses,” Camoens said. “If an account has enabled the auto-responder trigger based on ticket creation, then this allows for the ticket notification email to be sent from our customer’s accounts to these third parties. The notification will also include the Subject added by the creator of these tickets.”

Zendesk claims it uses rate limits to prevent a high volume of requests from being created at once, but those limits did not stop Zendesk customers from flooding my inbox with thousands of messages in just a few hours.

“We recognize that our systems were leveraged against you in a distributed, many-against-one manner,” Camoens said. “We are actively investigating additional preventive measures. We are also advising customers experiencing this type of activity to follow our general security best practices and configure an authenticated ticket creation workflow.”

In all of the cases above, the messaging abuse would not have been possible if Zendesk customers validated support request email addresses prior to sending responses. Failing to do so may make it easier for Zendesk clients to handle customer support requests, but it also allows ne’er-do-wells to sully the sender’s brand in service of disruptive and malicious email floods.

联系我们 contact @ memedata.com