SendGrid 并非就 ICE 或 BLM 发送邮件 – 这是一次网络钓鱼攻击。
SendGrid isn’t emailing about ICE or BLM – it’s a phishing attack

原始链接: https://fredbenenson.com/blog/2026/01/09/sendgrid-isnt-emailing-you-about-ice-or-blm-its-a-phishing-attack/

## 针对SendGrid用户的复杂钓鱼活动 一场令人担忧的钓鱼活动正在利用SendGrid(Twilio的电子邮件服务),通过入侵客户帐户并利用其合法的发送基础设施进行攻击。与传统的钓鱼攻击不同,这种“钓鱼嵌套”策略使用真实的SendGrid电子邮件——通过标准安全检查——来传递高度针对性和政治敏感的诱饵。 攻击者正在制作旨在引发强烈情绪反应的电子邮件,内容涉及分裂性话题,如LGBTQ+权利、黑人的命也是命(Black Lives Matter)以及对ICE(美国移民及海关执法局)的支持。这些电子邮件通常包含退订按钮,旨在识别并根据他们的信仰进一步定位个人。其他诱饵包括虚假的语言更改和帐户终止通知。 被入侵的帐户,可以通过发件人地址*不是*来自sendgrid.com来识别,被用于将这些电子邮件分发给现有的SendGrid用户,从而形成一个自我延续的循环。SendGrid已经意识到这个问题多年,并讨论了诸如强制双因素身份验证之类的解决方案,但实施进展缓慢。 **保护措施包括:**在SendGrid帐户上启用双因素身份验证,使用唯一密码,以及对于Gmail用户,创建一个过滤器以删除提及SendGrid但域名不是SendGrid域名的电子邮件。该活动的复杂性表明可能存在国家行为者或高度知情的国内团体参与,他们利用美国的文化分歧。

## SendGrid 与网络钓鱼诈骗利用政治情绪 一篇近期文章强调了一场令人担忧的网络钓鱼活动,利用了SendGrid的电子邮件基础设施。最初的标题(“为什么SendGrid会给我发邮件支持ICE?”)被批评为标题党,因为SendGrid并非*支持* ICE,而是被*用于*分发旨在利用强烈政治反应的网络钓鱼邮件。 这些诈骗旨在引发情绪反应——愤怒或恐惧——诱使用户点击恶意链接。例子包括虚假声称支持ICE或更改语言设置的邮件,甚至带有政治色彩的短信,威胁更改选民登记信息。 评论员指出,这并非SendGrid独有,通过Mailgun和其他提供商也观察到类似的诈骗。问题在于,不法分子可以轻松地利用这些服务发送大量电子邮件,以及情感操纵策略的有效性。讨论集中在改进电子邮件安全(SPF、DKIM、DMARC)、标题党在加剧问题中的作用,以及潜在的解决方案,例如AI生成的更准确的标题。最终,该事件凸显了网络钓鱼攻击日益复杂,以及在采取行动前验证链接的重要性。
相关文章

原文

For the past several months, I’ve been receiving and then ignoring a steady stream of concerning emails from Sendgrid, the popular email delivery service owned by Twilio that I use for sending emails from Breadwinner. I’d see some weird API error notification, login to my SendGrid account, check everything is working properly, and then delete the email. I didn’t pay too close attention to them until I saw a couple very strange ones.

Today, I received this one implying SendGrid was going to be adding a “Support ICE” button to all emails sent through their platform:


If you’ve been paying any attention at all to US politics, you’ll know how insidiuously provocative this would be if it were a real email.

But it isn’t. It’s a phishing email. If you use SendGrid, or have ever used it, you might be getting these too.

This phishing campaign is a fascinating example of how sophisticated social engineering has become. Instead of Nigerian 419 scams, hackers have evolved to carefully craft messages sent to professionals that are designed to exploit the American political consciousness.

The opt-out buttons are the trap.

The Attack

Here’s how it works: hackers compromise SendGrid customer accounts (through credential stuffing, password reuse, the usual methods). Once they have access, they can send emails through SendGrid’s infrastructure, which means the emails pass all the standard authentication checks (SPF, DKIM) that your spam filter uses to determine legitimacy. The emails look real because, technically, they are real SendGrid emails sent via SendGrid’s platform and via a customer’s reputation – they’re just sent by the wrong people and wrong domains.

They’re likely using a list of SendGrid customers so they can target this to only people who have used the service before.

Security researchers at Netcraft dubbed this “Phishception” back in 2024: attackers using SendGrid to phish SendGrid users, creating a self-perpetuating cycle where each compromised account can be used to compromise more accounts.

This has been going on for years. Brian Krebs wrote about it in 2020. And yet here we are.

The Lures

What’s changed, or at least what I’ve noticed recently, is the political sophistication of the bait. The attackers aren’t just sending “your account is suspended” emails (though they do that too). They’re sending messages designed to provoke a strong emotional reaction that compels you to click.

Here are some I’ve received:

The LGBT Pride Footer

From: [email protected]

This one claims SendGrid’s CEO “James Mitchell” (not a real person) came out as gay, and to show support, SendGrid is adding a pride-themed footer to all emails. “We understand this may not be right for everyone,” it helpfully notes, offering a “Manage Preferences” button.

Note the opt-out. If you support LGBTQ+ rights, you might ignore this. But if you don’t? You’re clicking that button immediately.

The Black Lives Matter Theme

From: [email protected]

For “one week,” all emails will feature a commemorative theme honoring George Floyd and the Black Lives Matter movement. This change applies “platform-wide to all users.”

Again: “If you prefer not to participate, you can opt out below.”

Note the sender domain: nellions.co.ke, a Kenyan domain. This is a compromised SendGrid customer account being used to send phishing emails to American targets about American political issues.

The ICE Support Initiative

From: [email protected]

This one arrived just this morning. SendGrid is supposedly adding a “Support ICE” donation button to the footer of every email sent through their platform, “in response to recent events” and “as part of our commitment to supporting U.S. Immigration and Customs Enforcement.”

The timing here is notable: these hackers are reading the news.

The Spanish Language Switch

From: [email protected]

And then there’s this one, which is just absurd: “Your language preference has been successfully changed to Spanish. All emails sent via the API will now be formatted in Spanish.”

This one is less politically charged and more “wait, what? I didn’t do that” – just enough anxiety to get you to click.

The Classic Account Termination

From: [email protected]

And of course, they still do the classics: “Your account has been terminated for misusing sending guidelines.”

The Pattern

Look closely at those sender addresses again at the top of the Gmail message:

  • drummond.com
  • nellions.co.ke
  • theraoffice.com
  • nutritionsociety.org
  • myplace.co

None of these are sendgrid.com. They’re all legitimate businesses whose SendGrid accounts have been compromised. When these emails hit your inbox, they pass authentication because they really were sent through SendGrid, just not by SendGrid.

Who’s Behind This?

The political sophistication on display here (BLM, LGBTQ+ rights, ICE, even the Spanish language switch playing on immigration anxieties) suggests someone with a deep understanding of American cultural fault lines.

We know that state actors have invested heavily in understanding and exploiting these divisions. Russian active measures campaigns have been documented doing exactly this kind of work: identifying wedge issues and creating content designed to inflame both sides. North Korea has demonstrated similar sophistication in their social engineering operations by targeting academics and foreign policy experts.

I’m not saying this is a state actor necessarily – the economic value of exploiting SendGrid’s formidable email infrastructure is most likely the appeal here. Similarly, this could just as easily be a domestic operation run by someone who’s extremely online and knows which culture war buttons to push. But I think the skill set required (technical ability to compromise accounts at scale plus cultural fluency in American politics) is notable.

Can This Be Fixed?

Honestly? I don’t know.

SendGrid has known about this problem for years. Twilio (SendGrid’s parent company) has talked about requiring two-factor authentication for all customers, but implementation has been slow. The fundamental issue is that SendGrid’s business model depends on making it easy for legitimate businesses to send email at scale. Anything that adds friction for good actors also adds friction for bad actors, but the bad actors are more motivated to work around it.

Meanwhile, the attackers only need one thing: access to SendGrid customer accounts. As long as people reuse passwords and don’t enable 2FA, there will be a steady supply of compromised accounts. It’s a bit of a hydra problem: cut off one head, another grows behind it.

Protecting Yourself

If you’re a SendGrid customer: enable two-factor authentication immediately. Use a unique password. Check your account for unauthorized API keys or sender identities.

If you’re just receiving these emails: don’t click anything. The links go to fake SendGrid login pages that will steal your credentials in real-time as they actually validate your password against SendGrid’s API and even capture your 2FA codes.

A Filter Hack

For Gmail users, you can create a filter to automatically delete SendGrid impersonation emails that don’t come from legitimate SendGrid domains:

  1. Go to Settings → Filters and Blocked Addresses → Create new filter
  2. In the “From” field, enter: -from:sendgrid.com -from:twilio.com
  3. In the “Has the words” field, enter: sendgrid
  4. Click “Create filter” and select “Delete it”

This will catch emails that mention SendGrid but aren’t actually from SendGrid. It’s not perfect, but it helps.

Have You Gotten These?

I’m curious what other variations are out there. If you’ve received SendGrid phishing emails (especially weird or politically-charged ones) leave a comment or reach out. The more examples we document, the easier it is for people to recognize these when they land in their inbox.

And if you work at Twilio/SendGrid and want to explain what’s being done about this: I’m all ears.

联系我们 contact @ memedata.com