Strobesstrobes
Platform
Solutions
Resources
Customers
Company
Pricing
Book a Demo
Strobesstrobes

Strobes connects every exposure signal to autonomous action, so security teams fix what matters, prove what works, and stop chasing noise.

Book a DemoTalk to an expert
ISO 27001SOC 2CREST
  • Platform
  • Platform Overview
  • Agentic Exposure Management
  • AI Agents
  • Integrations
  • API & Developers
  • Workflows & Automation
  • Analytics & Reporting
  • Solutions
  • Exposure Assessment (EAP)
  • Attack Surface Management
  • Application Security Posture
  • Risk-Based Vulnerability Management
  • Adversarial Exposure Validation (AEV)
  • AI Pentesting
  • Pentesting as a Service
  • CTEM Framework
  • By Industry
  • Financial Institutions
  • Technology
  • Retail
  • Healthcare
  • Manufacturing
  • By Roles
  • CISOs
  • Security Directors
  • Cloud Security Leaders
  • App Sec Leaders
  • Resources
  • Blog
  • Customer Stories
  • eBooks
  • Datasheets
  • Videos & Demos
  • Exposure Management Academy
  • CTEM Maturity Assessment
  • Pentest Health Check
  • Security Tool ROI Calculator
  • Company
  • About Strobes
  • Meet the Team
  • Trust & Security
  • Contact Us
  • Careers
  • Become a Partner
  • Technology Partner
  • Partner Deal Registration
  • Press Release

Weekly insight for security leaders

CTEM research, agentic AI trends, and what's actually moving the needle.

© 2026 Strobes Security Inc. All rights reserved.

Privacy PolicyTerms of ServiceCookie PolicyAccessibilitySitemap
Back to Blog
The Critical Risk of Using Dummy Email Domains in Payment Gateways
CybersecurityPayment gateway

The Critical Risk of Using Dummy Email Domains in Payment Gateways

Shiva Krishna SamireddyJanuary 3, 20254 min read

Table of Contents

  • The Discovery
  • Why This Is a Big Deal
  • The Real Impact
  • How to Fix This
  • A Broader Lesson
  • What We've Learned
  • Moving Forward

Authors

S
Shiva Krishna Samireddy

Share

Table of Contents

  • The Discovery
  • Why This Is a Big Deal
  • The Real Impact
  • How to Fix This
  • A Broader Lesson
  • What We've Learned
  • Moving Forward

Authors

S
Shiva Krishna Samireddy

Share

During our recent security assessments across multiple clients, we discovered a concerning pattern: many companies are unknowingly exposing their customers' sensitive payment information through a simple yet critical misconfiguration in their Juspay integration.  This issue stems from the improper use of dummy email domains. Here’s what we found and why it matters.

The Discovery

It started when we noticed something interesting - several companies were using a clever (but dangerous) workaround when integrating Juspay into their applications. Here's the scenario: Juspay needs an email address for every transaction, but many apps only collect phone numbers from their users. The solution these companies came up with? Creating dummy email addresses using unregistered domains.

For instance, they'd take a user's phone number like 1234567890 and automatically create an email like 1234567890@some-dummy-domain.com. Seems harmless, right? That's what we thought at first too. However, upon closer inspection, we discovered the real danger: these dummy email domains were often unregistered.

Why This Is a Big Deal

The issue became clear when we realized that these dummy domains weren't actually owned by anyone. In multiple cases, we were able to:

  1. Purchase these unregistered domains
  2. Set up a catch-all email system
  3. Start receiving thousands of real payment notifications within hours

Let’s pause here to emphasize something important: we've responsibly disclosed this vulnerability to all affected companies, and they've taken steps to fix it. But this pattern of dummy email domains in new assessments suggests that this problem is widespread and ongoing, which is why we're sharing this knowledge with the broader security community.

The Real Impact

In our assessments, we've seen this vulnerability expose:

  • Complete transaction histories
  • Customer phone numbers
  • Booking details
  • Payment success/failure notifications
  • Refund information

What makes this particularly concerning is that any malicious actor could exploit this oversight to gather sensitive financial information from thousands of customers in real-time.

How to Fix This

If you're using Juspay (or any payment gateway), here's what you should do right now to mitigate the risks posed by dummy email domains::

  • Check Your Integration: Are you using any dummy or temporary domains for payment notifications? This needs immediate attention.
    Own Your Domains: Generate notification emails using domains you control. For example:
payments-{unique-id}@your-company-domain.com
  • Use Webhooks: Many payment gateways offer webhook notifications as an alternative to email notifications. Consider using these instead.
  • Regular Audits: Make domain ownership and email configuration checks part of your regular security assessments.

A Broader Lesson

This vulnerability keeps appearing across different organizations because it stems from a common challenge: balancing user experience (not wanting to collect email addresses) with payment gateway requirements. While the workaround might seem clever in development, it creates serious security risks in production.

What We've Learned

After finding this issue across multiple assessments, we've observed that:

  • This isn't just a one-off mistake - it's a pattern
  • Development teams often implement this as a quick fix
  • The security implications aren't immediately obvious
  • Once exposed, the vulnerability is relatively easy to exploit

Moving Forward

If you're integrating any payment gateway, take a moment to review your email notification configurations. Remember, what seems like a harmless development workaround could become a serious security vulnerability in production.

The good news is that every company we've notified about this issue has taken it seriously and implemented fixes quickly. It's a reminder that sometimes the simplest oversights can create the biggest vulnerabilities - and that regular security assessments are crucial for catching these issues and mitigating risks like dummy email domain misuse before they can be exploited.

 

Tags
Cybersecurity

Stop chasing vulnerabilities Start reducing exposure

See how Strobes AI agents validate and fix your most critical exposures automatically.

Book a Demo
Continue Reading

Related Posts

The TanStack npm Attack That Punishes You for Fixing It — 170+ packages compromised, 84 malicious versions, 6 min publish window, 518M cumulative downloads
Supply Chain SecurityCybersecurity

The TanStack npm Supply Chain Attack That Hit 170 Packages and Punishes You for Revoking Your Token

The TanStack npm supply chain attack hit 12 million weekly downloads using three public techniques and zero novel code. Here is exactly how it worked.

May 13, 202613 min
Top 10 Data Breaches of April 2026 - Monthly Security Briefing
Data BreachesCybersecurity

Top 10 Data Breaches of April 2026

The biggest data breaches of April 2026 ranked and analyzed, from Checkmarx supply chain poisoning to Salesforce misconfigurations and ransomware hitting two major US banks.

May 1, 202615 min
Top CVEs of April 2026 - CVE Roundup
CVEVulnerability Intelligence

Top 7 Critical CVEs of April 2026 You Need to Act On Now

The top CVEs of April 2026 were exploited in hours. Marimo RCE, Windows IKE, Fortinet EMS, GitHub GHES, ActiveMQ, and more. Attack scenarios, risk context, and fixes.

May 1, 202622 min