frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Haraltd – A cross-platform Bluetooth daemon with a JSON-based RPC

https://github.com/bluetuith-org/haraltd
1•darkhz•13s ago•0 comments

The Stick in the Stream

https://randsinrepose.com/archives/the-stick-in-the-stream/
1•zdw•2m ago•0 comments

MAKERphone 2: first modular DIY phone, no soldering

https://circuitmess.com/products/makerphone-2-0
1•nateb2022•2m ago•0 comments

Sodium-ion battery cells near lithium-ion cost parity, set to get cheaper

https://www.ess-news.com/2026/01/09/sodium-ion-battery-cells-already-near-lithium-ion-cost-parity...
1•toomuchtodo•2m ago•1 comments

OpenAI to Buy Pinterest? Strategic Analysis

https://nekuda.substack.com/p/openai-to-buy-pinterest-heres-what
1•gmays•4m ago•0 comments

Vajra BM25 is a fast BM25 implementation in Python

https://twitter.com/aiexplorations/status/2009846407881212136
1•aiexplorations•7m ago•1 comments

Show HN: A website to save moments that remind you of someone

https://thisremindedme.com/
1•Winggo•7m ago•0 comments

Google and chatbot startup Character move to settle teen suicide lawsuits

https://www.washingtonpost.com/technology/2026/01/07/google-character-settle-lawsuits-suicide/
1•1vuio0pswjnm7•10m ago•0 comments

Agent skills: what can go wrong?

https://github.com/pors/skill-audit
1•pors•10m ago•0 comments

You probably don't need Oh My Zsh

https://rushter.com/blog/zsh-shell/
2•fla•11m ago•0 comments

Fix Your Robots.txt or Your Site Disappears from Google

https://www.alanwsmith.com/en/37/wa/jz/s1/
1•qingcharles•12m ago•0 comments

Show HN: VoiceBrainDump – voice-first idea capture, single HTML file, offline

https://voicebraindump.app/
1•digi_wares•15m ago•0 comments

Show HN: Focus timer that turns hours into assets

https://seton.run/
1•keplerjst•19m ago•0 comments

AI Flatters with Fidelity

https://lucent.substack.com/p/ai-flatters-with-fidelity
2•surprisetalk•25m ago•0 comments

Lidify: Self-hosted, on-demand audio streaming platform like Spotify

https://github.com/Chevron7Locked/lidify
1•thunderbong•28m ago•0 comments

Show HN: Rank up your local business on Google Maps

https://www.mapclimb.com/
2•bagusfarisa•28m ago•0 comments

The world has too much oil – Will companies want Venezuela's?

https://www.npr.org/2026/01/07/nx-s1-5668491/venezuela-oil-global-markets
4•geox•34m ago•0 comments

Elon Musk's Grok Has Friends in High Places: US Patent Office chief AI officer

https://jacobin.com/2026/01/grok-hayes-artificial-intelligence-deepfakes
1•wahnfrieden•35m ago•0 comments

Checks and Balances Are Dead

https://rall.com/2026/01/08/checks-and-balances-are-dead
6•SanjayMehta•35m ago•0 comments

M2.1: Multilingual and Multi-Task Coding with Strong Generalization

https://www.minimaxi.com/news/m21-multilingual-and-multi-task-coding-with-strong-general
1•gmays•38m ago•0 comments

Character.ai and Google agree to settle lawsuits over teen suicides

https://www.ft.com/content/ac518567-d901-4fae-86a3-eab54b12a81d
1•1vuio0pswjnm7•48m ago•0 comments

Demystifying Evals for AI Agents

https://www.anthropic.com/engineering/demystifying-evals-for-ai-agents
1•vinhnx•49m ago•0 comments

Best Practices for Coding with Agents

https://cursor.com/blog/agent-best-practices
1•vinhnx•49m ago•1 comments

Microsoft revealed as company behind controversial data center proposal in MI

https://www.cnbc.com/2026/01/07/microsoft-behind-controversial-data-center-in-michigan-township.html
4•1vuio0pswjnm7•51m ago•0 comments

A man powers his home for 8 years using 1,000 recycled laptop batteries

https://scienceclock.com/a-man-powers-his-home-for-8-years-using-1000-recycled-laptop-batteries/
3•ashishgupta2209•53m ago•1 comments

OLED Not for Me

https://nuxx.net/blog/2026/01/09/oled-not-for-me/
9•c0nsumer•53m ago•11 comments

Discover Forgotten Subscriptions

https://www.dropsubs.com/
1•insomnie•55m ago•1 comments

Dymaxion Chronofile

https://en.wikipedia.org/wiki/Dymaxion_Chronofile
1•treetalker•56m ago•1 comments

High Agency Engineering

https://edtw.in/high-agency-engineering/
1•Eong•58m ago•0 comments

Lies Screenwriters Tell Themselves About AI

https://elliotgrove.substack.com/p/7-lies-screenwriters-tell-themselves
2•matthewsinclair•1h ago•1 comments
Open in hackernews

SendGrid isn’t emailing about ICE or BLM – it’s a phishing attack

https://fredbenenson.com/blog/2026/01/09/sendgrid-isnt-emailing-you-about-ice-or-blm-its-a-phishing-attack/
179•mecredis•12h ago

Comments

afavour•10h ago
Before anyone launches themselves into the sky: the title is clickbait. This is about phishing attempts that use ICE to persuade you to click. Sendgrid the company is not emailing about supporting ICE. But technically Sendgrid the infrastructure is.
ExpertAdvisor01•10h ago
Yeah I noticed the same thing with other providers. Especially with ones that provide free trials.
isk517•10h ago
Also they are using variants of the same scam to target a variety of groups
sys32768•10h ago
I think HN should embrace AI to the point of having an alternative AI-generated title next to the original title, to reduce clickbait and reduce the global rage index.
etyp•10h ago
There is a chance that the title here was intentionally worded to answer a question people are likely to search for, then actually answer their concerns.
barbazoo•10h ago
Then the "alternative AI-generated title next to the original title" would say so.
krapp•6h ago
HN would never do that, it would violate the minimalism of the site.

Most people aren't even aware that their posted URLs can be changed or their titles re-edited automatically because the UI doesn't give affordances for anything. You're just expected to notice and edit it out within the edit window (which there also isn't an affordance for.)

cdfuller•10h ago
I've been thinking about building a browser extension that turns clickbait headlines into factual titles.

"Why is SendGrid emailing me about supporting ICE?" becomes "Phishing Campaign Targets SendGrid Users via Compromised Accounts and Politically Charged Bait"

I think it would be more time than I'd like to commit though.

BoneShard•10h ago
I tried to vibe code it about a year ago(a firefox extension), worked surprisingly good. Basically for a small set of web sites I frequent, just rewrite titles or remove links all together if a title is a click-bait or ragebait.
hju22_-3•10h ago
I don't like LLMs much, though I also don't really care much either, and I don't trust any models to get the content nuance right. But I'd still welcome it if it helps a little between the tons of clickbait or just straight up incorrect or sensationalist titles.
yannyu•10h ago
This is an interesting idea, I think clickbait titles are one of many problems with our engagement-based social media tools today. For the sake of experimentation and transparency, here's the suggested titles from ChatGPT 4. They seem to be more descriptive and accurate overall.

---

Possible alternative titles that better match the article’s content:

How Phishers Are Using SendGrid to Target SendGrid Users with Political Bait

– Accurately reflects the mechanism (SendGrid abuse), the audience, and the novel political/social-engineering angle.

SendGrid Account Takeovers Are Fueling a Sophisticated Phishing Ecosystem

– More technical / HN-native framing, avoids culture-war implications.

Phishception: Politically Targeted Phishing Sent Through Compromised SendGrid Accounts

– Highlights the core insight and the self-reinforcing nature of the attack.

snowwrestler•10h ago
Mods regularly rewrite titles to improve clarity and this is probably a good candidate.
dang•9h ago
That's a pretty good idea as long as humans could review/approve.
santadays•10h ago
Maybe one day our knee jerk reactionary outrage will be quelled not by any enlightenment but because we are forced to grow weary of falling prey to phishing attacks.

I'd feel pretty stupid getting worked up about something only to realize that getting worked up about it was used against me.

I'm writing this because for a moment I did get worked up and then had the slow realization it was a phishing attack, slightly before the article got to the point.

Anyways, I think the clickbait is kindof appropriate here because it rather poignantly captures what is going on.

deflator•10h ago
I agree. It can demonstrate the knee-jerk affect in real time for the reader. Someone who reacts strongly to the title of this thread would have experienced a similar reaction if they had received the SendGrid phish email. Never seen clickbait wording actually be appropriate before.
panarky•9h ago
When I see stories that make me want to click, I read HN comments first, and 8 times in ten that saves me a from a "won't get fooled again" moment.

There's got to be a way to generalize this for anyone who still cares about the difference between real facts and manipulation.

idiotsecant•10h ago
The effectiveness of these techniques will die off over time as young people are increasingly inoculated against them in the same way our generations are generally immune to traditional advertising. The memetics filters get better over time as us geezers are replaced by new models.
cheald•10h ago
Rather ironic to complain about phishing attempts with clickbait (which, I largely think of as phishing's kid brother).
idiotsecant•10h ago
You say ironic I say fitting.
darth_avocado•10h ago
I seriously hope HN discourse has the bare minimum of “open the link and read it before commenting”.
krapp•10h ago
I have some bad news for you...
orthecreedence•10h ago
^ Can anyone TL;DR this comment?
krapp•9h ago
Most people on Hacker News don't bother to read the linked article and either comment based on their impression of the title or whatever random thing happens to be on their mind at the time. Most people who do bother to read the linked article stop as soon as they encounter javascript or formatting or too much whitespace or a minor logical, spelling or grammatical error and then that will likely become the subject of the entire thread.

The number of people who actually read the entire article and then attempt to comment in good faith are few and far between.

layer8•10h ago
Your hope is in conflict with reality.
SoftTalker•8h ago
That is the expectation but no way to enforce it of course.

What happens a lot, at least for me, is that people will start reading the comments to see if they want to bother reading the link. Then they might start commenting on what's already been said. It's easy to slip into that pattern.

Though you also frequently see top-level comments that appear to be based on the headline alone.

indigodaddy•10h ago
So a completely irresponsible headline. Is the writer confused or do we think they were aware of this distinction?
zzzeek•10h ago
right, so on the topic of "phishing emails designed to elicit enough emotion that you forget to consider the button might be a phish", the headline itself of this blog post is doing the exact same thing, really. The headline should be, "Phishing scams launched through SendGrid exploit deep political sentiments to achieve success" or something like that.

but that would be clear and very boring. nobody would read your blog then. A headline that very obviously implies Sendgrid the company supports ICE, and so much so that they are emailing all their customers about it, clicks galore. Well done.

mecredis•9h ago
Author here. I quickly thought of the title for the article and shipped it. I agree it's clickbait-y and apologize to SendGrid (and any confused readers) but yes, as you say it's _technically_ correct in a very narrow sense – SendGrid's infrastructure and users are sending these emails, it's just that they're fraudulently associated with SendGrid the company.

In any case, I revised the title to "SendGrid isn’t emailing you about ICE or BLM. It’s a phishing attack."

Maybe someone can edit the title of the submission on HN accordingly?

dang•9h ago
Ok we changed the article from https://fredbenenson.com/blog/2026/01/09/why-is-sendgrid-ema... to https://fredbenenson.com/blog/2026/01/09/sendgrid-isnt-email... and the HN title accordingly.
buellerbueller•8h ago
The title is genius; it uses the same psychological trick as the phishers are, to point out to us how vulnerable we are. Obviously, for you to know the title is clickbait, you'd've had to click through and read it, which is the exact social engineering vulnerability the author is trying to demonstrate being exploited.

I thank the author for getting me this way, as I would have likely fallen for the unsubscribe trick.

TZubiri•10h ago
Interesting that politics is a vector for contagion.

When you think about politics is very contagious, politicians infect activists, who infect regular folk that advocate for stuff they don't benefit from, when elections come near, it's flu season.

Double parasite burgers where a new parasite leeches of an existing vector are common in biology as well. Like malaria and mosquitoes.

SketchySeaBeast•10h ago
Philosophically fun, sure, but the article also points out that another vector was "Your language settings have been changed to Spanish", so I don't know if it's as profound as you're making it out to be. Anything that makes us panic can be a vector.
nathanyz•10h ago
I have been receiving 2-3 of these variations per day. Have been reporting them as phishing in our GSuite account, but they just keep coming.
losthobbies•10h ago
That’s some devious shit. I can just imagine someone furiously clicking the button in a rage
toast0•10h ago
Having a friendly name listed in the From field is part of the problem. SPF, DKIM, and DMARC make it possible to control who can send as your domain, if the receiver cares to check. If you have strict SPF and DMARC rules, most receivers will drop or not accept emails that fail the rules. But you can't control using your brand from unaffiliated domains.

Would you even open an email from noreply@drummond.com if that's what showed up in the message list?

On mobile it's worse. Gmail (Android) doesn't even show the From address at all when you open an email. For some emails, I can tap the sender icon and see the address, for others I have to find the hit reply (but if DMARC et al doesn't validate a Reply-To address) or go find a computer and see the message there.

ZeroConcerns•10h ago
> Can this be fixed?

For popular senders: sort-of: in your incoming mail server, substring-match the display name of the sender against popular brands, and ensure the actual domain matches.

This works remarkably well for proper brands (FedEx et al), but breaks down when the brand name regularly occurs in "normal" names, the sending brand sends mail from all over the place, or "innocuous" impersonation takes place all the time.

Like, somehow, From: "VODAFONE" <shipping-update@dpd.co.uk> is a 100% legit sender (assuming SPF and DKIM verification pass), despite both Vodafone and DPD being pretty common impersonation targets. You'd think they'd know better, but alas.

So, yeah, room for improvement and such...

layer8•9h ago
Use <service>@<yourdomain> as your email address when signing up, and check the To header when receiving emails.

And/or, long-press or right-click on any link to inspect the linked domain.

lightandlight•8h ago
I often go one step futher by appending a short random identifier, `{service}.{id}@{domain}`, to make it harder to guess (in case someone learned of my email address policy).

I created a little GTK program to help: https://github.com/LightAndLight/gen-alias

layer8•8h ago
Yes, it’s really <f(service, rand())>.
zahlman•8h ago
What fraction of people do you suppose actually have a <yourdomain> to do this with?

Even some highly technically inclined people (like myself) can be entirely ignorant of the process. It's not as if consumer ISPs provide the service.

roboror•8h ago
Sub-addressing (doing tag+handle@domain.com) is supported by many email services but + may be flagged as an illegal character.
Terretta•7h ago
at least hotmail, gmail, apple's various mail, though with apple just using hide my email is that whole idea fully and beautifully automated for normies
layer8•6h ago
The process isn’t difficult and worth acquainting yourself with.
epistasis•8h ago
If you don't control your own domain fully, almost all email services let you do:

user+servicetag@domain.com

And have it go to user@domain.com with the servicetag still in the To: field. At least, I have never encountered a problem with this.

cheschire•7h ago
And then the spammers (or other illegitimate source) just add this to their processing…

^([^@+]+)\+[^@]*(@.*)$

epistasis•7h ago
The use case here is using a unique email address to help verify the sender of the email, it's not connected to spam usage.
cheschire•7h ago
So you’re suggesting the sender use the + modifier on the from address?
epistasis•7h ago
Here's the suggestion:

>Use <service>@<yourdomain> as your email address when signing up, and check the To header when receiving emails.

The user of the webservice specifies a unique email per webservice; knowledge of that unique email address serves as a hint that the email came from someone that has discovered that email address, i.e. the webservice itself.

cheschire•7h ago
Right, so 99% of the time that’s a spammer that is going to use that discovered email. I updated my message to specify other illegitimate sources to cover that less than 1%
pests•6h ago
Some sites (hulu maybe? iirc) strip off the + and treat it as a bare email, with dedupe checks and all that.

Spammers won't respect the + either, they will clean their list of any +tags before sending.

The best I've actually come across is to abuse gmails period policy. I haven't seen sites dedupe this or perform any other checks or manipulation.

If you have enough letters in your alias you can treat the possible period locations as binary. For example, pests@ would have 4 edible spots, so I could make 16 different dot addresses: pests@, pest.s@, pes.ts@, pes.t.s@, pe.sts@, pe.st.s@, [...], p.e.s.t.s@

Then you can just remember/record the decimal ID you used per site.

epistasis•6h ago
> Spammers won't respect the + either, they will clean their list of any +tags before sending.

That's the entire point, if you get an email from the site but it doesn't include your +servicename tag then you immediately can immediately tell it's a phishing attempt or spam. If the tag is there it's not a 100% guarantee that it's legit, but absence of the tag is a big red flag.

pests•5h ago
You can't tell who it came from though, unlike my method at least.

Also, the +tag could get lost though just normal data clean up / normalization.

sig-term•10h ago
relatedly, my wife received polititexts destined to her conservative father. The latest was actually genius IMO, in that it stated "Dear STEVEN, due to inactivity, your registration will be changed to DEMOCRAT in 20 minutes unless you navigate to this link." It, I assume, redirected to some support page to donate to the US conservative party or its affiliates. The social engineering is getting more effective
mcintyre1994•10h ago
Inevitably some people are going to be away from their phones when they receive that, so I wonder what they think when they continue getting needy messages from Republicans after that!
SketchySeaBeast•10h ago
I don't know if the fact that it fully slipped into the absurd or the fact that it probably still worked on people is sadder.

I do love the idea of voter registration oscillating back and fourth at 20 minutes intervals forever. Would make voting in the primaries way more exciting as the voter base kept flipping.

idiotsecant•10h ago
This isn't even close to the most ridiculous emotional manipulation techniques American conservative fundraising uses to target old people who might not be in full possession of their faculties. It's some of the scummiest stuff possible.
zahlman•8h ago
To me as a Canadian, the absurd part is that ordinary people are expected to have "registered" with a party (as opposed to registering with the independent organization that runs elections, like we do; they automate getting most of the voter roll from Revenue Canada, but this requires your explicit consent on the tax form).
LorenzoGood•8h ago
This is just for primaries, you register to vote with the state as well.
buellerbueller•8h ago
Still absurd that "free" "democratic" elections are allowed to require party membership, even for the primary.
lbotos•8h ago
How do you envision this working without the "opposing party" poisoning the vote to get a weaker opponent?
buellerbueller•8h ago
I envision that it does not matter, because this is a tactic that would 1) be available to all, and 2) it gives up your vote for someone of your own party, thereby weakening your own position. It's self regulating.
mothballed•8h ago
Can't they do that now? If I think my chosen primary guy is winning in a landslide I could just register for another party I don't like and vote for someone who I think is easier to beat.
yunwal•7h ago
You would still forfeit the ability to vote in your primary though. I do think there are people that do this, but most people want to vote in their primary regardless of whether it's a landslide.
bell-cot•7h ago
Is actual party membership required?

Or, in effect, are you just required to claim either that you're more of a cat person, or that you're more of a dog person?

1-more•7h ago
Yeah it's the latter. The US does not have party membership the way that, say, the UK does. In many states, it's open primary. In Colorado, for instance, I get mailed Democratic and Republican primary ballots and can vote by mailing in either one. I think you get neither counted if you mail in both, but I have no idea; I've never tried it.

The last time anyone tried to poison a presidential election by promoting a weaker candidate on the other side in the US, it was the Democrats boosting Trump in 2016. It did not work out.

Izkata•6h ago
For an alternate example, in Illinois you choose one at primary election time and only get that one. This year the options are Democrat, Republican, Libertarian, and Non-Partisan (which means only the referendums, not the elections).
schnable•6h ago
What's the purpose of a primary election? It's to select a party's candidate for a general election. It's not very obvious that this should even be a democratic process, but if it is, why shouldn't party members be the ones selecting their own candidates?
zahlman•7h ago
In Canada, those votes happen independently as decided (deemed necessary) internally by the party, and public participation is much less common.
SketchySeaBeast•7h ago
This would kind of be the same as us (I'm Canadian too) registering with the NDP so we can vote for the next leader. But the level of lying on display here is just insane.
technothrasher•6h ago
I've never once registered with a party in the US. I always check "independent" on my voter registration. But I'm in a state with open primaries, so I can still vote in one or the other primary, even though I'm not registered with the party.
Hizonner•5h ago
> I don't know if the fact that it fully slipped into the absurd or the fact that it probably still worked on people is sadder.

The thing is that that one plays on propaganda that people have already been conditioned to accept.

Very probably this person's father believes that the Democrats (a) control the state-operated voter registration system, and (b) manipulate it to their advantage. He believes that because he's been sent that message through a vast number of channels for many years. He would think it was absolutely in character for his registered party to be changed, and would probably think that would somehow affect how his vote was actually counted.

It's no more absurd than the idea that busloads of illegal aliens are showing up to vote "somewhere". Or whatever other idiotic lies they've been telling forever.

nashashmi•10h ago
First thought... Why would ICE need donations? I then realized how unrecognizable scams have become to me now. Older people are going to be in a worse position.
david_shaw•10h ago
You can donate to reduce the national debt, so it's not that far out of the realm of possibility that federal agencies would solicit donations, too.

https://www.pay.gov/public/form/start/23779454

martey•10h ago
"The fundamental issue is that SendGrid’s business model depends on making it easy for legitimate businesses to send email at scale."

I disagree with this conclusion, if not only because other email service providers don't have this issue.

It wouldn't surprise me if something was broken with SendGrid's internal infrastructure. I used to be a SendGrid customer until my deliverability started being affected by this issue. SendGrid took weeks to reply to my customer service messages about resolving this, even though I was a paying customer and was renting private IP addresses from them to send mail.

I finally gave up and closed my SendGrid account in July 2021. Despite this, they continued to send me monthly invoices until May 2022. Multiple SendGrid representatives promised that they had resolved the issue, but it wasn't until one CSR added me to SendGrid's global suppression list that they finally stopped.

pksebben•10h ago
If the attackers in this case are cleverly exploiting anything, I would bet on aggressive grey patterns like that more than I would US culture wars. Noticing that a company has policies that let you hide in plain sight means that you're paying close attention. Knowing what issues are hot button culture flamewars means you can access literally any American news outlet.
citizenpaul•7h ago
>closed my SendGrid account ....continued to send me monthly invoices

I used to run IT for a medium company. The amount of times I saw this with various SaaS companies was troubling. We had hundreds of services some as small as a single manager that demanded X and company wide tools. It was frequently a several months long hassle to get them to stop billing us when we cut ties with them. I wish I kept personal records now it was a minority but definitely in the 15%'ish range.

forthwall•10h ago
Oh! I’ve seen this phishing attempt as well, I believe it was was Gemini they said they would add an “lgbt” banner unless you changed settings.
lbrito•10h ago
So the modern Gestapo is so deeply unpopular it is being used for phishing attacks - no one (normal) wants to be seen anywhere near it. Amazing.
sakopov•10h ago
Is this a new trend in phishing emails? They appear to be using legitimate domains to bypass spam detection. Usually the domains are associated with legitimate companies who are completely oblivious. I always wondered how this works. Is it a broken contact form somewhere?
lbotos•8h ago
the article talked about how the sendgrid accounts are real, and presume compromised.

I suspect that once the sendgrid account is compromised, they then send out these phishing emails, hoping to compromise _other_ sendgrid accounts to look for password overlap and/or keep the flow going.

pixl97•7h ago
One way is to look for companies that have SPF records (or whatever the system is these days) that contain ranges/names of large providers like sendgrid. Then they test sending mails with those large providers names under said system until they get ones that go out, and launch a campaign.
parliament32•10h ago
We've been getting similar phishing emails claiming to be from SendGrid, except they're along the lines of "we're adding a rainbow banner to the footer of all emails to show LGBT support, click here to opt out".

It's especially funny because SendGrid isn't even one of our vendors.

zzzeek•10h ago
right but nobody clicked the button on that one
itintheory•8h ago
That example is in TFA.
eps•10h ago
Before you reach for your wallets, remember -

It might be 50 days by an (admittedly very cool) bus, but it's only 84 days in foot!

* Consult your Google Maps and a sense of humor if it sounds to good to be true!

snowwrestler•10h ago
Not just SendGrid, I have received very sophisticated phishing emails “from” MailGun as well. I think the advantages of getting into your email channel justify a lot of investment by the bad guys.
ekjhgkejhgk•10h ago
In the 1920s and 30s they had mailing campaigns recruiting to join the SA. Same principle.
idiotsecant•10h ago
Read the story
educasean•10h ago
Is this an education problem? Should the general public be more diligent in checking the sender domain of the emails they read?

Is this a UX issue? Should email clients highlight and emphasize the sender domain more than their display name?

schnable•5h ago
> Should the general public be more diligent in checking the sender domain of the emails they read?

yes

agwa•10h ago
2FA doesn't stop phishing unless it's WebAuthn. But SendGrid, which is owned by Twilio, only supports 2FA based on SMS or the Authy App (which is also made by Twilio): https://www.twilio.com/docs/sendgrid/ui/account-and-settings...

It seems like Twilio has a conflict of interest that prevents them from offering WebAuthn, as that would be a tacit admission that their SMS and Authy products are not actually that secure.

Terretta•7h ago
rich irony that twilio numbers don't qualify to receive SMS codes when senders check if it's a virtual number (the regulated aka important ones do check)
kgeist•10h ago
I wonder why Gmail and other email providers don't just run an LLM/ML pipeline to detect phishing emails. It seems that matching an email's content with the sender's domain (and possibly analyzing the content behind links) would be enough to show, with high certainty, a warning like "Beware: this looks like a phishing email." Is it too expensive? Too many false positives?
zahlman•8h ago
To my understanding, they already do use some form of ML for this and it's part of how things get routed to the spam folder without explicit rules.
pixl97•7h ago
>LLM/ML pipeline to detect phishing emails.

I think you're about 20 years behind the times if you think they don't.

There are a whole lot of problems with it when you start pressing the finer details like you list. For example, just look at the legit emails banks send out. They will tell you not to click links claiming to be your bank, then include links (claiming to be your bank) for more information.

Simply put the rules block too much corporate email because people that write corporate email do lots of dumb things with the email system.

Tossrock•5h ago
It's true that a lot of established ML techniques were first popularized to fight spam (ie bayesian filtering), but it might also be the case that they're not applying the full might of eg Gemini-3-Pro to every email received. I suspect Gemini-3-Pro would do an effectively perfect job of determining if something is phishing, with negligible values in the false quadrants of the confusion matrix, but it's probably too expensive to use in that way. Which is why things like this can still slip through.
yabones•7h ago
They do - well sort of.

The most essential check is SPF and DKIM which authenticate if the message has come from an authorized server. The problem is that most mail services are too lenient with mismatched sender identification. On one hand, people would be quite vocal about their mail provider sending way too much legitimate (but slightly misconfigured) mail to the spam folder. However it allows situations like to happen where the FROM header, the "From:" address, and the return path are all different.

Most mail systems have several stages of filters, and the first ones (checking authentication) are quite basic. After that, attachments, links, and contents are checked for known malware. Machine learning might kick in after this, if certain criteria are met. Mail security is very complicated and works well except for the times it falls flat on its face like this.

https://en.wikipedia.org/wiki/Sender_Policy_Framework https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail

flatcakes•10h ago
I've been getting a lot of these, and forwarding them (along with the raw source of the email headers) to abuse@sendgrid.com with some success.
bdcravens•8h ago
I received one, though it was for adding a footer honoring MLK. I kinda thought it was odd, but did't think much of it, since I'm apparently not in the group that would be offended in any way. I wonder if the variation they use is random, or in any way location-based to maximize response (I'm in Texas).

I've also received a bunch of API failure phishing emails, as well as some implying we needed to change our auth to Sinch.

schnable•6h ago
I think the main motivator is that most people/businesses would not want their transactional emails to include political at all.
detourdog•8h ago
I can't think of one email I received from sendgrid I would consider legitimate. Anytime I receive an email distributed by sendgrid I have found it actually had no value to me. Sometimes it's from a business I have dealt with but I never wanted or was interested in the content.
SoftTalker•8h ago
Same impression. SendGrid, MailChimp, any of those are just enabling spam at the end of the day.
ceejayoz•8h ago
Don't leave Salesforce out.
iamacyborg•7h ago
In the same way that all software engineers are building harmful products, yes, sure.
plorkyeran•7h ago
Do you specifically go out of your way to check who sent every transactional email you receive and take notes on which email sending service your order confirmation was sent by? That would be a very weird thing to do and would be the only way to know that.
lagniappe•7h ago
Weird? Do you know where you are? We're all nerds here, in many shades of what you label as 'weird'.
detourdog•7h ago
True this is HN. I’m being curiosity shamed:). Most of the phishing attempts I get are Gmail.
detourdog•7h ago
When I receive email that is not from someone I know or understand why I receive it I check the source.

I don’t like receiving email that are not directly relevant to me.

This does mean that if it’s an order confirmation I wouldn’t check. So I may not know of legitimate emails from sendgrid only the illegitimate.

rphillips•7h ago
If using GSuite then head to the Gmail admin panel and create a compliance rule with 2 regex expressions.

1. Add expressions to: If ALL of the following match the message.

2. Expression 1: Type: Advanced content match Location: Full headers Match type: Matches regex (?im)^from:\sSendGrid(?:\s+\w+)\s*<[^>\r\n]+>+$

3. Expression 2: Type: Advanced content match Location: Sender header Match type: Not matches regex (?i)^[A-Za-z0-9._%+-]+@(sendgrid\.com|twilio\.com)$

Set the rule to reject or quarantine. Users will not see the messages unless the attackers change the From header.

TZubiri•7h ago
Making a custom rule for a specific sender feels like fighting a fire with a glass of water.

It's better to focus on more systematic solutions. There exist a lot of them, SPF, DKIM, Recipient mail filtering (Your mail provider).

The screenshotted emails don't even do anything tricky like spoofing the sender address, it looks like "Sent from no-reply@theraoffice.com". If it spoofed the domain it would have been caught by SPF/DKIM.

Most of the time the user doesn't need to do much, you can just be weary of sender domains, and report the email as phishing and help blacklist that specific IP address/domain. Similar to how in medicine sometimes the physician tells you to drink water and rest, no medicine needed, just let the immune system do its thing.

rezonant•6h ago
As explained in the article, the scammers are using compromised Sendgrid domains to send the phishing emails. This means the emails are going to pass SPF/DKIM. Those domains are apparently owned by legitimate businesses which are actual Sendgrid customers. The phishers just compromised their account and API credentials
ZoneZealot•6h ago
SendGrid's platform doesn't need to be the sender of these emails at all. It's just classic phishing, the emails can pass SPF, DKIM and DMARC as all of these rely on DNS resource records to be created on the RFC5321.MailFrom and/or RFC5322.From domain. Which is under control of the spammer. It's not pretending to be from sendgrid.com, if it was then these measures would help.
TZubiri•5h ago
Correct, I think the confusion might arise because of the self replicating nature of this attack when the target domain is an MTA.

I can't pinpoint it exactly, but it might be a combination of the replication cycle of the attack being recursive and very short if the target is an MTA. But it may also be because the fact that sendgrid clients are sendgrid clients is public information.

Kind of how like meta companies are overrepresented in their medium, in a stock exchange banks are overrerpresented, lots of websites about building websites, lots of road ads are about placing road ads.

TZubiri•5h ago
There's some confusion here, there is a secondary compromise, but it's not very relevant.

The actual origin of the email: theraoffice.com

The fake origin of the email: SendGrid

There is a mismatch there, easy to detect. SendGrid was not compromised, and nothing was sent in the name of sendgrid or whatever.

Now the domain theraoffice might have been registered by an attacker, warmed up with some small fake traffic, and aged. Or it might have been compromised.

The previous email could have used sendgrid or mailchimp or google workspace, that's not very relevant. The SPF and DKIM would always pass, because SPF and DKIM verifies that the owner of theraoffice.com is the one sending the emails.

There might be a connection with SendGrid, but it's not at all accurately explained in the article, it may be as simple as SendGrid being a common phishing target of attackers just because they can get access to more email infrastructure for magnifying their reach, like a self-replicating virus.

rphillips•6h ago
The first rule doesn't match a specific sender. Run it through a re2 regex tester.
scosman•7h ago
SendGrid phishing emails are some of the best phishing emails. I get emails that there's elevated error rates on an API (`/v1/send`). Looks very legit, good design, reasonable call to action, some urgency which makes me want to click. They know from MX records I send email with Sendgrid, so it's well targeted. Easy catch when I see the domain, but other than that it's the best I've seen in years.
creeble•6h ago
I've been getting them for weeks and never noticed they were phishing.

I only used a SendGrid account briefly, as a potential backup to my current outgoing transaction mail provider. Sent exactly 5 test emails I think.

The ICE one this morning gave me pause, but only about 2s before I deleted it and moved on with my busy day of reading HN posts.

rezonant•6h ago
That would seem to imply they weren't checking MX as I presume you have removed Sendgrid from your SPF allowed senders policy by now.
tonymet•6h ago
It would be good to hold carriers accountable for fishing and spam. Sendgrid , Twilio and other saas messaging carriers need to do a better job with integrity. I don’t expect them to carry the whole burden, but some negative incentive to promote investment . It could be as simple as enforcing sender pays metering . We all know spam is 60+ % of traffic, so sender pays would drive down spam very quickly
alila•5h ago
The OP didn’t explain or showed the unsubscribe button compromise trick. Anyone here can shed some light on it?

I always had the habit of clicking on the unsubscribe button whenever I see an unwanted email. And I’d like to know what would happen if I click on malicious unsubscribe link.