A widespread surge of automated spam is bypassing filters by exploiting unsecured Zendesk support systems to flood inboxes globally. These messages appear as legitimate account activation or support notifications, leaving many users receiving hundreds of unwanted emails in a short period.
Inboxes across the globe are currently being targeted by a renewed wave of automated spam that leverages the infrastructure of legitimate customer support platforms. Users report being inundated with a massive volume of emails that appear to be authentic notifications from various companies. This tactic allows the messages to bypass traditional spam filters because they originate from trusted domains associated with established businesses.
The emails often feature subject lines related to account activation or support ticket creation, which can be alarming to recipients who never initiated such requests. Many victims have noted that these messages arrive in rapid succession, sometimes totaling hundreds of emails within a few hours. This phenomenon has caused significant frustration as users struggle to distinguish real correspondence from the automated deluge.
Security researchers have observed that this activity is likely a coordinated effort to abuse Zendesk ticket submission forms. By submitting data through these unsecured portals, attackers can force the system to send out confirmation emails to a target list of addresses. This essentially turns a company's own support tools into a weapon for mass distribution, making the source of the spam look like a reputable service.
The primary goal behind such an attack remains a subject of discussion among cybersecurity experts. Some believe it may be a form of email bombing intended to bury important security alerts or financial notifications under a mountain of junk, while others view it as a demonstration of a persistent vulnerability within help desk software. Regardless of the motive, the impact on individual users is a cluttered and confusing inbox experience.
As companies work to secure their support instances, users are advised to remain cautious of unsolicited account notifications. While the emails themselves come from legitimate servers, the intent behind their generation is malicious. For now, the focus remains on how these platforms can better validate submissions to prevent their automated systems from being exploited in this manner.
Source: Zendesk Spam Wave Returns Flooding Users With Activate Account Emails



Solid breakdown on how attackers weaponize trusted infrastructure. The bit about burying important notifications under spam floods is espically clever since most people just end up ignoring all the noise. I've seen this tactic work in phishing campaigns where the real malicious email gets lost in the clutter.