Product
Security success story: How Mailgun stopped a large-scale phishing attack
Go behind the scenes of a large-scale phishing attack at Mailgun. Find out how we stopped this threat from impacting our employees, our platform, and our customers. Discover lessons you can learn to boost your own security response.
PUBLISHED ON
When you support companies around the world by facilitating the sending of billions of emails, you’ve got a pretty big target on your back. So, we expect threat actors to take aim at us. This summer, Sinch Mailgun and other companies in the digital communications space became the targets of a large-scale multi-channel phishing attack.
First, here’s the good news...
Mailgun was effectively able to mitigate this phishing attack and the bad actors failed to impact our systems in any way. To be clear, that means no customer accounts or data were compromised.
The only bad news is that we can expect these kinds of threats to continue and will only become more sophisticated with time. But that’s okay, because we’re ready for it.
So, how did we stop this large-scale phishing attack? To help you understand the measures Mailgun takes to protect our platform as well as our customers, we decided to give you a look behind the scenes of a cybersecurity response in our organization. The story begins in late July when employees started getting suspicious SMS messages.
Table of contents
Identifying malicious text messages
Social engineering and intelligence
Mechanics of the attack
1. Employee awareness
2. Secure email gateways and spam filtering
3. Hardware tokens (YubiKeys)
4. Additional security measures
Key takeaways from our response
Details of the phishing attack
The first phishing attempts occurred on July 23rd when multiple employees received malicious text messages alerting them to a change in their schedules. These messages, sent from an unknown number, implied they were coming from Sinch, which is the new parent company of Mailgun, Mailjet, and Email on Acid.
The first thing that stands out about this attack is that it used SMS phishing, also known as smishing. As the attack progressed, the threat actors also attempted to phish employees via vishing (voice/phone call phishing).
Maybe the attackers thought phishing an email service provider (ESP) through the inbox was a little too obvious. Whatever the case, while smishing and vishing aren’t nearly as common as traditional email phishing, they are definitely on the rise.
According to Proofpoint’s “State of the Phish Report,” 74% of companies around the world experienced smishing attacks last year, and 69% saw vishing attacks. Both statistics represent a double-digit increase for these threat vectors year-over-year.
Identifying malicious text messages
Here’s a look at how the smishing messages appeared to Mailgun employees.

Phishers often use a sense of urgency to convince targets to click on links that take them to fake login pages. In this case, the domain name for the fake login page wouldn’t be familiar to our employees.
However, the attackers tried various messages, using the name of different identity management systems in the link as well as different calls to action, such as expired passwords.