Since January 18, thousands of people around the world have started to receive waves of strange and repetitive emails that, at first sight, appear to come from legitimate companies. This is not an isolated failure or a traditional virus, but a massive abuse of customer care systems using Zendesk: attackers create false tickets by introducing foreign mail addresses, and the automatic response mechanism of these platforms itself constantly triggers confirmations.
Public information about this phenomenon began to circulate on social networks, with users showing entry trays stacked from messages with disconcerting issues. Experts and journalists from the sector collected these testimonies and published research explaining the mechanism behind the problem. A technical and follow-up summary appeared in BleepingComputer, and security professionals like Troy Hunt and other community members shared evidence in their accounts of X and in networks.

What distinguishes this campaign from a conventional spam is that messages seem to come from real corporate domains and support systems, which makes it easier for them to draw out the trash mail filters. Even so, in the vast majority of cases there are no links or malicious files intended to scam or install software: the apparent intention is to generate noise and confusion rather than steal credentials. Post affairs are deliberately provocative, imitate legal or content withdrawal notifications, or promise supposed promotions like "Free Nitro Discord," and often use Unicode characters to adorn or distort the text.
Organizations whose Zendesk bodies were identified as broadcasters of these automatic responses include recognized digital and entertainment world names: messaging platforms and games, cloud storage services, security companies and public agencies. Some companies concerned have responded publicly to users explaining that these are automatic responses to tickets that were not generated by account creditors and calling for those messages to be ignored.
Zendesk had already warned in December about a similar type of abuse, which he called "relay spam," and published recommendations to mitigate risk. In its technical documentation it explains that allowing the creation of tickets from unverified users facilitates this attack vector and suggests measures such as restricting who can send requests and removing fields or templates that accept unvalidated addresses or issues. The Zendesk note is available at your help centre at support.zendesk.com as well as practical guides to harden the configuration in Permitting only added users to submit tickets and tips to combat spam.
From the platform, Zendesk stated that it has deployed additional safeguards to detect and stop this unusual type of activity, implementing stricter limits and monitoring to stop the shipping peaks. However, the practical responsibility lies with the companies that make up these systems: many opt for open policies that facilitate contact, but such openness can also be exploited by those who have large-scale mailing lists.

For those who have received these waves the main recommendation is to keep calm: there is no evidence that the messages contain phishing links or files committed in this particular campaign, and the companies concerned insist that no access to user accounts or changes in services has occurred without authorization. However, it is appropriate to extend the usual caution with any unexpected mail - do not click suspicious links, check the sender carefully and remove redundant messages - and, if you have any doubt, contact the company directly through its official channels rather than respond to the message received.
On the organizational level, the lesson is clear: "comfort" should not mean exposure. Support and safety teams should review their ticket flows, limit automatic creation from unverified directions and audit templates and placeholders that allow for the issuance of unchecked notifications. This change in configuration policies, coupled with Zendesk's improved platform detection, significantly reduces the ability to convert a legitimate service into a spam machine.
This episode recalls that the infrastructures we use daily can become unexpected vectors when combining permissive configurations and actors that seek to cause large-scale discomfort. Keeping informed, implementing supplier safety recommendations and validating changes in the way automatic care systems respond are essential steps to prevent digital noise from polluting legitimate communication between companies and users. To follow the technical coverage and updates on this incident, BleepingComputer has posted case follow-up on its site: BleepingComputer - Security, and Zendesk's own support pages contain the official instructions mentioned above.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...