Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsZendesk Spam Wave Returns, Floods Users with 'Activate Account' Emails
Zendesk Spam Wave Returns, Floods Users with 'Activate Account' Emails
CybersecuritySaaS

Zendesk Spam Wave Returns, Floods Users with 'Activate Account' Emails

•February 5, 2026
0
BleepingComputer
BleepingComputer•Feb 5, 2026

Companies Mentioned

Deichman

Deichman

ZEN

2K Games

2K Games

Dropbox

Dropbox

DBX

X (formerly Twitter)

X (formerly Twitter)

LinkedIn

LinkedIn

Why It Matters

The abuse turns legitimate customer‑support systems into spam relays, eroding trust in automated communications and exposing organizations to reputational risk.

Key Takeaways

  • •Attackers abuse open Zendesk ticket forms for email relays
  • •Hundreds of bogus “Activate account” emails hit inboxes daily
  • •Zendesk added monitoring limits, but vulnerabilities persist
  • •Companies like Dropbox issue warnings to affected recipients
  • •Unverified ticket submissions enable large‑scale spam campaigns

Pulse Analysis

Zendesk’s ticketing platform is designed to streamline customer support, automatically sending confirmation emails when a user submits a request. Bad actors have discovered that if the ticket‑creation endpoint is left open to unverified users, it can be weaponized as a mass‑mail relay. By feeding thousands of bogus email addresses into these forms, attackers generate legitimate‑looking “Activate your account” messages that bypass most spam filters, creating a flood of unwanted mail that appears to originate from reputable brands.

For businesses, the fallout is twofold. First, the deluge of counterfeit support emails can damage brand credibility, as customers may question the authenticity of genuine communications. Second, the volume strains internal IT resources, prompting emergency ticket triage and potential phishing investigations. Mitigation steps include enforcing verified‑user ticket submission, disabling placeholder fields, and leveraging Zendesk’s newer monitoring limits. Companies that act quickly—by updating portal settings and informing users—can limit exposure and preserve trust.

The resurgence of this attack underscores a broader trend: SaaS tools with automated outbound messaging are attractive targets for spam relays. As more organizations adopt cloud‑based support solutions, vendors must embed stricter abuse detection and provide clear configuration guidance. Meanwhile, security teams should routinely audit public-facing support forms, employ rate‑limiting, and monitor outbound email patterns for anomalies. Proactive hardening of these channels will be essential to prevent future spam waves from exploiting the very systems designed to enhance customer experience.

Zendesk spam wave returns, floods users with 'Activate account' emails

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...