Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks

11/17/2020
by   Kaiwen Shen, et al.
0

As a fundamental communicative service, email is playing an important role in both individual and corporate communications, which also makes it one of the most frequently attack vectors. An email's authenticity is based on an authentication chain involving multiple protocols, roles and services, the inconsistency among which creates security threats. Thus, it depends on the weakest link of the chain, as any failed part can break the whole chain-based defense. This paper systematically analyzes the transmission of an email and identifies a series of new attacks capable of bypassing SPF, DKIM, DMARC and user-interface protections. In particular, by conducting a "cocktail" joint attack, more realistic emails can be forged to penetrate the celebrated email services, such as Gmail and Outlook. We conduct a large-scale experiment on 30 popular email services and 23 email clients, and find that all of them are vulnerable to certain types of new attacks. We have duly reported the identified vulnerabilities to the related email service providers, and received positive responses from 11 of them, including Gmail, Yahoo, iCloud and Alibaba. Furthermore, we propose key mitigating measures to defend against the new attacks. Therefore, this work is of great value for identifying email spoofing attacks and improving the email ecosystem's overall security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/02/2018

Revisiting Email Spoofing Attacks

The email system is the central battleground against phishing and social...
research
03/20/2023

Attacks Against Security Context in 5G Network

The security context used in 5G authentication is generated during the A...
research
10/19/2020

The Impact of DNS Insecurity on Time

We demonstrate the first practical off-path time shifting attacks agains...
research
02/14/2023

Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy

The critical role played by email has led to a range of extension protoc...
research
04/01/2020

Research of Caller ID Spoofing Launch, Detection, and Defense

Caller ID parodying produces the valid Caller character, in this manner ...
research
03/19/2019

Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services

Defending against distributed denial of service (DDoS) attacks in the In...
research
12/04/2019

The method of detecting online password attacks based on high-level protocol analysis and clustering techniques

Although there have been many solutions applied, the safety challenges r...

Please sign up or login with your details

Forgot password? Click here to reset