Zendesk ticket systems hijacked in massive global spam wave
Recorded: Jan. 22, 2026, 3:03 a.m.
| Original | Summarized |
Zendesk ticket systems hijacked in massive global spam wave News Featured Fake Lastpass emails pose as password vault backup alerts Microsoft shares workaround for Outlook freezes after Windows update Fortinet admins report patched FortiGate firewalls getting hacked Hackers exploit security testing apps to breach Fortune 500 firms Zendesk ticket systems hijacked in massive global spam wave Chainlit AI framework bugs let hackers breach cloud environments Cisco fixes Unified Communications RCE zero day exploited in attacks New Android malware uses AI to click on hidden browser ads Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityZendesk ticket systems hijacked in massive global spam wave Zendesk ticket systems hijacked in massive global spam wave By Lawrence Abrams January 21, 2026 People worldwide are being targeted by a massive spam wave originating from unsecured Zendesk support systems, with victims reporting receiving hundreds of emails with strange and sometimes alarming subject lines. The emails are being generated by support platforms run by companies that use Zendesk for customer service. Wave of spam coming from unsecured ZenDesk instancesSource: BleepingComputer Secrets Security Cheat Sheet: From Sprawl to Control Related Articles: Email Lawrence Abrams Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Microsoft releases OOB Windows updates to fix shutdown, Cloud PC bugs Ingram Micro says ransomware attack affected 42,000 people New PDFSider Windows malware deployed on Fortune 100 firm's network Sponsor Posts Discover how phishing kits are sold and deployed. Download the full research report. Discover how to scale IT infrastructure reliably without adding toil or burnout. Identity Governance & Threat Detection in one: Get a guided tour of our platform Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
This document details a widespread, global spam wave originating from hijacked Zendesk support systems. The incident, reported by Lawrence Abrams of BleepingComputer.com in January 2026, involved attackers abusing Zendesk’s open ticket submission process to generate and send massive volumes of automated emails to a diverse range of companies utilizing Zendesk for their customer support. The core of the problem stems from Zendesk’s policy of allowing unverified users to submit support tickets. Attackers exploited this feature by creating numerous fake tickets, triggering automated confirmation emails to be sent to a large list of email addresses. The subjects of these emails were often bizarre and alarming, mimicking legal notifications, corporate takedowns, or offering free Discord Nitro, intended to cause immediate concern and confusion among recipients. Many emails utilized Unicode fonts, further adding to the visual disruption and sense of urgency. Affected companies included prominent names like Discord, Tinder, Riot Games, Dropbox, 2K, CD Projekt, Maya Mobile, NordVPN, and government entities such as the Tennessee Department of Labor and Revenue. The attackers’ goal appears to be “relay spam,” a tactic used to bypass email filters through a compromised system. This method relies on the recipient's email client to handle the incoming message, allowing it to bypass traditional spam detection mechanisms. Zendesk recognized this abuse in a previous December advisory and subsequently implemented new safety features, including enhanced monitoring and activity limits, designed to quickly detect and stop these types of attacks. Companies impacted, such as Dropbox and 2K, issued statements reassuring their users that the emails were illegitimate and that no genuine action was being taken based on the fraudulent tickets. They emphasized that Zendesk does not act on sensitive requests without authenticated, direct authorization from the account holder. Zendesk’s proactive measures demonstrate a recognition of the vulnerability inherent in open ticket submission platforms. To mitigate future incidents, companies are advised to restrict ticket creation to only verified users and eliminate placeholder fields that allow unrestricted email addresses or ticket subjects to be used. This approach focuses on strengthening security controls and minimizing the potential avenues for exploitation. The entire situation highlights the importance of vigilance and proper security configurations within customer support systems, especially those reliant on automated communication channels. |