Attackers Hijack SaaS Notifications for Phishing Campaigns

Attackers Hijack SaaS Notifications for Phishing Campaigns

Cyber Threat Intelligence is highlighting a concerning trend observed by Cisco Talos: threat actors are increasingly weaponizing the notification pipelines of popular Software-as-a-Service (SaaS) platforms, like GitHub and Jira, to distribute spam and phishing emails. These malicious messages leverage the legitimate mail delivery infrastructure of these platforms, making them significantly harder for security tools to flag and block. By exploiting the built-in notification features, attackers can bypass standard email security controls and land directly in users’ inboxes. This tactic, dubbed β€˜Platform-as-a-Proxy’ (PaaP) by some, capitalizes on the inherent trust organizations place in communications from verified SaaS providers.

Cisco Talos noted that this abuse is primarily linked to phishing and credential harvesting operations. Once an attacker gains compromised credentials or initial access through these means, it often paves the way for more significant attacks. As an example, during a campaign on February 17, 2026, Cisco Talos estimated that nearly 3% of emails sent from GitHub were associated with this type of abuse. The technique essentially turns trusted SaaS communication channels into vectors for social engineering.

The core of this exploit lies in embedding malicious lures within legitimate, system-generated notifications. This circumvents traditional reputation-based email security filters. By abusing these automated notification systems, threat actors are effectively turning a feature designed for collaboration and productivity into a tool for cybercrime, highlighting a significant blind spot in how organizations might monitor or trust their incoming SaaS-related communications.

What This Means For You

  • Security teams should re-evaluate their email filtering rules and threat detection strategies to specifically account for and flag malicious content originating from legitimate SaaS notification systems, rather than relying solely on sender reputation.
πŸ”Ž
Stay ahead of this threat Search threats by organization, set watchlist alerts, or get a weekly SIEM digest with detection rules matched to your vendors β€” inside Telegram.
Open Intel Bot β†’

Related coverage

Ghostwriter Targets Ukraine Government with Prometheus Phishing

The Belarus-aligned threat actor, Ghostwriter (also tracked as UAC-0057 and UNC1151), is actively targeting Ukrainian government entities. According to The Hacker News, this group is...

threat-intelvulnerabilitymalwarephishing
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma

Trend Micro Apex One Zero-Day Under Active Exploitation

Trend Micro has confirmed a zero-day vulnerability in its Apex One security product, actively exploited on Windows systems. BleepingComputer reports that this critical flaw allows...

threat-inteldata-breachmalwarevulnerabilitymicrosoft
/SCW Vulnerability Desk /HIGH /⚑ 2 IOCs /⚙ 3 Sigma

Iranian APT Screening Serpens Uses AppDomainManager Hijacking in Espionage Campaigns

Palo Alto Unit 42 reports that the Iranian APT group Screening Serpens is actively employing sophisticated techniques, including AppDomainManager hijacking and new Remote Access Trojan...

threat-intelAPTmalwareresearchunit-42
/SCW Research /MEDIUM