All Posts
Email Security
Ai
Threat Research
Trusted but Not Verified: A Case Study of Compromised Infrastructure Spearphishing Attacks
New research analyzes the "UN Summit" phishing campaign, a textbook example of "Living off the Land" attacks that evade rule and reputation based detection. With 40% of identified government impersonation attacks now originating from spoofed or compromised domains, this post explains why Artificial Intelligence analyzing emails like an analyst is the only viable defense against the next generation of AI Spearphishing.
Written by
Vito Prasad
Published on
November 20, 2025

The most dangerous emails in your inbox right now aren't the ones that look fake. They are the ones that are technically "real."

For years, defenders have relied on authentication standards like SPF, DKIM, and DMARC to verify sender identity. But attackers have adapted. They are no longer just spoofing domains; they are hijacking them.

We are witnessing a rise in attacks utilizing compromised legitimate accounts—a tactic known as "Living off the Land." By launching attacks from real servers, criminals inherit the trust of the domain, bypassing standard filters that rely on reputation.

This weekend, Sid Trivedi, Partner at Foundation Capital, became the latest high-profile target of this evolution.

The Attack: A Textbook Case of "Living off the Land"

Sid received an invitation to speak at the "2026 United Nations Global Initiative on Sustainable Development Summit" in Toronto. It was professional, flattering, and offered comprehensive travel assistance.

It was also a fake.

Fortunately, while a major legacy security vendor let this email slide into the inbox, AegisAI’s intelligent AI Agent caught it instantly.

Here is why this specific attack is the perfect case study for the emerging threat landscape of 2026.

Traditional Filters Evaded: Why "Good" Security Missed This

To understand why this email landed in Sid’s inbox, we have to acknowledge that Google and Microsoft have actually gotten very good at blocking bad emails.

In 2025, standard "spray and pray" phishing campaigns rarely work. Default filters are excellent at spotting malicious links, blocklisted domains, and obvious spoofing attempts.

But this success has forced attackers to evolve. They can no longer fake a domain; they have to steal one.

The "UN Summit" email is a textbook example of Living off the Land.

  • Compromised Infrastructure: The attackers didn't spoof pa.gov.br; they compromised a legitimate account on that server.
  • Technical Trust: Because the email originated from a real Brazilian government server, it passed every standard authentication check (SPF, DKIM, DMARC). To a Secure Email Gateway (SEG), this looked like a verified government communication.
  • Payload-Less & Semantically Fuzzed: There were no malicious links to scan. The content was grammatically perfect and tonally appropriate—designed not to trigger a filter, but to trigger a human response.
  • The "Reply-To" Pivot: While the sender was legitimate, the Reply-To header redirected to gisdsummit.org. This moved the conversation to an attacker-controlled domain immediately.

This is the new reality: As providers block the "junk," the only threats that make it through are the ones that look technically perfect. Legacy tools saw a "safe" sender. Aegis AI saw a semantic mismatch between a Brazilian municipality and a global UN summit.

The Data: Government Impersonations Don't Use Gmail

Sid’s experience aligns perfectly with the data we uncovered in our 2025 AI Spearphishing Report.

We analyzed over 1,900 malicious emails to map how different attack types behave. The results were stark.

According to our research, 40% of Tax and Government impersonation attacks in our sample originated from "Spoofed/Other" domains.

Zero percent came from "Free Email" providers like Gmail or Yahoo.

This explains exactly why traditional training fails. We tell employees to "check the sender address" for suspicious free webmail accounts. But in the case of the UN Summit phishing attack, the sender was a government address. The attackers are operating in the "Spoofed/Other" category specifically to bypass these rule-based filters.

The Hard Truth: "Living off the land" and AI are the new and growing norm

Perhaps the most alarming part of Sid’s story is his admission: "I almost fell for a phishing email... It took me a few minutes to realize it was phishing."

Sid is a tech-savvy Venture Capitalist. If he nearly missed it, what chance does an overworked finance manager or HR coordinator have?

For a decade, the industry has relied on training employees to spot typos, poor grammar, and generic greetings. But this strategy is failing against the projected 100% year-over-year increase in AI-powered attacks we identified in our report.

As we detail in the Discussion and Implications section:

"AI-generated attacks eliminate every one of these red flags... They are contextually relevant, capable of referencing a recent company project, a colleague's name, or a target's recent post on LinkedIn."

As AI-generated fakes become indistinguishable from legitimate communication, the effectiveness of user training will drop rapidly. We can no longer ask employees to be the shield when the arrows have become invisible.

Want to learn more? Read the Full Report

The "UN Summit" phishing attack is a warning shot. The era of generic, large blast-radius phishing is over. The era of the AI-powered Spearphishing attacks has begun.

To understand the full scope of this shift—and how to defend against it—download our comprehensive research paper: "AI-Powered Spearphishing at Scale"

Inside the report, you will find:

  • The Defender's Dilemma: Why traditional tools fail against 5-minute AI attacks.
  • The True Cost: A breakdown of financial impact, including hidden regulatory fines and brand damage.
  • The Future of Defense: How "semantically aware" systems are the only way to counter AI with AI.

Download the Free Report Here

Don’t Miss the Next Big Threat
Subscribe today to receive updates on the newest cyberattacks, product innovations, and best practices for protecting your organization.

Subscribe

Success! We’ll be in touch soon.
Something went wrong while submitting.
Related topic articles
Read All Articles
Announcements
Accel and Foundation Capital lead our $13M Seed fundraise
The era of AI-powered threats requires AI-powered defense. That's why we're proud to announce our $13M Seed Round for AegisAI Security, led by Accel and Foundation Capital. Our mission is clear: to reimagine email security and create a future where every inbox is inherently safe.
Email Security
Ai
Why Aegis
Why We Started AegisAI
Email Security
Customer Stories
Lokker + AegisAI - Customer Story
Learn how Lokker thwarts attacks seamlessly while reducing overhead for their security team.