The “Verified” Scam: Why I Just Received a Phishing Email from the Portuguese Police

Polícia de Segurança Pública

I’ve spent years dissecting headers at Riskseeker, but this morning my inbox handed me a puzzle that perfectly illustrates the “identity crisis” in modern cybersecurity.

I received an email at ruisantos@riskseeker.com. The sender? The Portuguese Public Security Police (PSP). The content? A tired, low-effort “donation” scam from a “Mrs. Mavis Wanczyk.”

Normally, this is a 2-second job: Delete and move on. But I didn’t. I looked at the source code, and what I found is a perfect storm of hijacked trust.

Analyzing the Perfect Header

Usually, when a scammer impersonates a government agency, they fail at the technical gates. They “spoof” the name, but the SPF fails, or the DKIM signature is missing.

Not this time. I pulled the raw headers, and the results were chilling:

Plaintext

From: Alda Maria **** **** Leal <****leal@psp.pt>
Received: from mx3.rnsi.mai.gov.pt ([185.126.89.202])
DKIM-Signature: v=1; a=rsa-sha256; c=simple/relaxed; d=psp.pt; 
X-ThreatScanner-Verdict: Negative
X-SpamExperts-Class: ham
Authentication-Results: 
	spf=pass smtp.mailfrom=psp.pt;
	dkim=pass header.d=psp.pt;
	dmarc=pass header.from=psp.pt

For those who don’t speak “Header” let me translate: This email is technically flawless. It passed SPF, DKIM, and DMARC. It was routed through the official MAI (Ministry of Internal Administration) mail servers. Because it came from a “trusted” government domain with valid cryptographic signatures, every major security filter (IronPort, Sophos, SpamExperts) gave it a green light and a “Negative” threat verdict.

Where did the Gun Shot come from? 172.22.10.19

When I dug deeper into the x-originating-ip, I saw an internal address: 172.22.10.19.

This tells me this wasn’t an external attacker pretending to be the police. This was an Account Takeover (ATO). An internal account (****leal@psp.pt) was likely compromised, whether through a weak password, a previous phishing hit, or a lack of Multi-Factor Authentication (MFA), and used as a “mule” to bypass global spam filters.

Why This Matters

This is more than just a funny story about a scammer in a police uniform. It’s a massive security gap.

  1. Reputation Hijacking: Scammers are no longer just building fake websites; they are moving into “High-Reputation” environments. If your security relies on “Domain Trust,” you are already vulnerable.
  2. The Authority Bias: When a user sees @psp.pt, their guard drops. If this attacker had sent a malicious PDF instead of a “donation” story, the infection rate would have been devastating.
  3. Identity is the Perimeter: The PSP’s firewalls did their job, but their identity management failed. In 2026, if you aren’t using hardware-backed MFA for every single institutional account, you are effectively providing a platform for global fraud.

My Verdict

The “Farda Azul” was used as a proxy for a Gmail-based scammer. It’s a reminder that trust is a vulnerability. When the police’s own domain tells you “Good News,” it’s time to start looking very closely at the bad news hidden in the source code.

My Recommendation

Audit all government accounts, enforce MFA, monitor for internal anomalies.

Stay skeptical. Analyze the headers.