chat
expand_more

SendGrid And Mailtrap Credentials Sold On Cybercrime Forums For Just $15

SendGrid and Mailtrap credentials are being sold on cybercrime forums for as little as $15, and they are used to send phishing emails and bypass spam filters. Learn how infostealers and checkers enable this underground market.
April 25, 2024

Cybercriminals frequently sell access to compromised email infrastructure, such as SMTP credentials and transactional email service API keys, for use in phishing, spam, and other malicious email campaigns intended to steal sensitive data. By monitoring underground cybercrime forums and marketplaces, we recently discovered Mailjet, SendGrid, Mailtrap, and SMTP credentials for sale on several Russian-language hacking forums at astonishingly low prices.

Why Attackers Target SendGrid and Mailtrap

Attackers often target platforms like SendGrid and Mailtrap due to their credible reputations and wealth of customer data. As a widely used email service, SendGrid holds access to vast email lists and communication channels of businesses and individual users. Compromising SendGrid credentials can grant attackers the ability to send out email attacks at scale or manipulate legitimate communications for malicious purposes. Similarly, Mailtrap, a platform for email testing, contains email templates, test data, and SMTP configurations, making it a valuable target for attackers seeking to exploit vulnerabilities in email systems.

Because these domains have a long history of legitimate sending, they can easily bypass the anti-spam and sender authentication protocols that many email providers use to block suspicious mail—making them attractive to criminals who use them to reach their targets.

Sendgrid 1

How Attackers Obtain Stolen Credentials

Most compromised SMTP login credentials on these forums are obtained through brute force and credential stuffing attacks rather than direct system intrusions. Automated brute forcing scripts and tools continuously guess passwords using combinations of usernames, emails, and passwords leaked in past data breaches. When they eventually guess correctly, they add the working logins to their lists.

Sendgrid 2

A cybercriminal selling an SMTP brute forcing tool.

Transactional email service API keys, however, cannot be brute forced due to their length. Many of the keys found for sale can be traced back to information stealers, which are also known as infostealers. Infostealers are a type of malware designed to gather sensitive information from infected computers, such as login credentials and financial information. These malicious programs often operate in the background without the user's knowledge, collecting and transmitting data to the attackers.

Sendgrid 3

A cybercriminal selling looking to purchase infostealer logs.

The stolen data obtained by infostealers is often referred to as "logs" on cybercrime forums and networks. Some cybercriminals have even built entire websites and platforms that run on a subscription model—giving members access to thousands of new "logs" per day.

Sendgrid 4

A cloud platform that sells thousands of new logs daily.

Our recent research into this shows that there is a significant demand for "logs" from popular email-sending platforms like Mailjet, SendGrid, and Mailtrap.

Sendgrid 5

A cybercriminal looking to purchase ESP and SMTP credentials.

High Demand Drives Specific Cybercrime Services

To automate the process of verifying the validity of these stolen accounts, cybercriminals have developed dedicated tools called "checkers." These checkers are designed to test the login credentials against the email service provider's (ESP) platform, filtering out invalid or banned accounts.

Sendgrid 6

A cybercriminal selling an ESP credential checker.

Only the verified accounts are then packaged and sold to other cybercriminals or used directly in their own malicious email campaigns. Cybercriminals often prefer using these stolen accounts because they provide a more reliable and legitimate way to send phishing emails and other malicious content, as opposed to using newly created accounts that may trigger spam filters more easily.

Securing Your Email from Attacks

Your cloud email platform is a critical business asset, but it's also a prime target for cybercriminals. As threat actors grow more sophisticated, preventing attacks sent from these legitimate platforms is essential.

Inbound email security plays a crucial role in detecting attacks sent from compromised SendGrid and Mailtrap accounts (plus others!) before they hit user inboxes. Abnormal’s AI-powered solution uses advanced human behavior AI and content analysis to understand the behavior of every user in your organization, as well as the vendors you work with. This allows the platform to detect and remediate suspicious activity and anomalies in the cloud environment—even when they originate from a seemingly legitimate source like SendGrid or Mailtrap.

By staying vigilant and leveraging innovative solutions, security leaders and the organizations they protect can mitigate the risks associated with these attacks.

Interested in learning more about how Abnormal can protect your organization? Schedule a demo today!

Schedule a Demo
SendGrid And Mailtrap Credentials Sold On Cybercrime Forums For Just $15

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Writing Detection Rules with LL Ms Blog
Discover how Abnormal Security leverages large language models (LLMs) to automate and enhance email threat detection with AI-generated detection rules.
Read More
B MKT628 Cyber Savvy Social Images
Discover key insights from seasoned cybersecurity professional Nicholas Schopperth, CISO at Dayton Children’s Hospital.
Read More
B Podcast Blog
Discover 'SOC Unlocked,' Abnormal Security's new podcast featuring host Mick Leach and cybersecurity expert guests like Jeremy Ventura, Dave Kennedy, and Mick Douglas.
Read More
B 07 22 24 MKT624 Images for Paris Olympics Blog
Threat actors are targeting French businesses ahead of the Paris 2024 Olympics. Learn how they're capitalizing on the event and how to protect your organization.
Read More
B Cross Platform ATO
Cross-platform account takeover is an attack where one compromised account is used to access other accounts. Learn about four real-world examples: compromised email passwords, hijacked GitHub accounts, stolen AWS credentials, and leaked Slack logins.
Read More
B Why MFA Alone Will No Longer Suffice
Explore why account takeover attacks pose a major threat to enterprises and why multi-factor authentication (MFA) alone isn't enough to prevent them.
Read More