Weaponizing SaaS Notification Pipelines - New Phishing Tactics

Significant risk — action recommended within 24-48 hours
Basically, hackers are using trusted email systems to trick people into giving up their passwords.
Cisco Talos warns of a rise in phishing attacks using SaaS notifications. Attackers exploit platforms like GitHub and Jira to bypass security. This tactic poses a significant risk of credential theft.
What Happened
Cisco Talos has identified a troubling trend in cybercrime: the abuse of notification pipelines in popular Software-as-a-Service (SaaS) platforms like GitHub and Jira to deliver phishing emails. This method allows attackers to send messages that look legitimate, making it easier for them to bypass traditional email security measures.
Who's Being Targeted
The primary targets of these phishing campaigns are users of collaboration platforms. By exploiting the trust associated with emails from well-known services, attackers can reach potential victims more effectively.
How It Works
Attackers utilize the Platform-as-a-Proxy (PaaP) model, leveraging the automated notification systems of SaaS platforms. For instance, by embedding malicious links in commit messages on GitHub, they trigger automatic notifications sent to users. Since these emails originate from legitimate servers, they often evade spam filters and security checks.
GitHub Campaigns
In a specific campaign observed on February 17, 2026, nearly 2.89% of emails sent from GitHub were linked to phishing activities. Attackers craft commit messages to include social engineering hooks, ensuring that the malicious content appears trustworthy due to the platform's reputation.
Jira Exploitation
Unlike GitHub, the Jira exploitation focuses on the collaborative invitation feature. Attackers create projects and send invitations, embedding fraudulent messages within the trusted email template. This tactic takes advantage of the platform's established credibility, making it difficult for recipients to discern the malicious intent.
Signs of Infection
Users should be vigilant for unexpected emails from trusted platforms that contain links or requests for sensitive information. If you receive a notification that seems out of context or requests unusual actions, it may be a phishing attempt.
How to Protect Yourself
To defend against these sophisticated attacks, organizations should consider the following measures:
- Implement Zero-Trust Architecture: Treat all SaaS notifications as untrusted until verified.
- Monitor Upstream API Activities: Use tools to track unusual activities within SaaS platforms that may indicate preparation for an attack.
- Employ Behavioral Profiling: Establish a baseline for expected communications from SaaS tools to identify anomalies.
- Educate Users: Regularly train employees on recognizing phishing attempts and the importance of scrutinizing unexpected notifications.
By adapting security measures and fostering awareness, organizations can better protect themselves from these evolving phishing tactics that exploit trusted SaaS infrastructures.
🔍 How to Check If You're Affected
- 1.Check email headers for unusual sender addresses.
- 2.Look for unexpected requests or links in notifications.
- 3.Verify the legitimacy of notifications through direct platform access.
🗺️ MITRE ATT&CK Techniques
🔒 Pro insight: This trend highlights the need for organizations to rethink their trust models, especially regarding automated notifications from SaaS platforms.