Email Security Standards Proving Porous Against Malicious Attacks, Report Finds
Introduction
A recent vendor report released by security firm Cloudflare has highlighted the vulnerabilities in email security standards when it comes to protecting users from malicious attacks. The report states that a majority of unwanted messages (89%) passed the checks of at least one of the three major email security standards – Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), or Domain-based Message Authentication, Reporting and Conformance (DMARC). While these standards play a crucial role in making the internet safer, they can only protect users from threats they were designed to address. Attackers can easily set up domains that comply with these standards, allowing their malicious payloads or links to go undetected.
The Limitations of Email Authentication Standards
Oren Falkowitz, the Field Chief Security Officer at Cloudflare, emphasizes that although these email authentication standards have made the job of attackers harder, it is not impossible for them to bypass these measures. Attackers can leverage common email providers, ensuring that their attack messages pass authentication checks and reach their intended targets. The data from the report underscores the need for continued efforts to protect users from fraudsters and cyber attackers who exploit email to send scams and malware to victims.
A Layered Approach to Defense
David Raissipour, Chief Technology and Product Officer at Mimecast, suggests taking a layered approach to defense, acknowledging that no security solution can provide 100% coverage. He likens this approach to putting a lock on the front door of a house – it’s part of a layered security system but cannot guarantee absolute protection. Each layer adds an additional level of security and reduces the risk of successful attacks.
Deceptive Practices and Impersonation
Cloudflare’s “2023 Phishing Threats Report” highlights that email security technologies do not prevent lookalike email content, domains similar to a company’s brand, and some replay attacks. Approximately one in seven phishing emails seeks to camouflage the attack under the branding of a well-known company. The report also notes that deceptive links were used by attackers 36% of the time, and emails originated from newly registered domains in 30% of the cases.
The top impersonated brands included Microsoft, the World Health Organization, and Google, with the top 20 brands accounting for more than half of all impersonation attempts. These findings underscore the need for organizations to be vigilant and verify the domains and senders of email messages, even if they come from validated servers.
The Need for Multilayered Security
In addition to email security, organizations must also consider the security of other communication channels, such as Slack, Microsoft Teams, or other messaging apps. Mimecast’s Raissipour argues that a holistic approach to “email security” is necessary, as employees, partners, and customers use various communication platforms. These platforms have become targets for malicious actors, and organizations should implement security controls to protect all their communication channels.
Conclusion
The recent report from Cloudflare highlights the limitations of email security standards in protecting users from malicious attacks. While these standards are important, they are not foolproof, and attackers can exploit their weaknesses to bypass authentication checks. Organizations must adopt a layered approach to defense, verifying the domains and senders of emails, and considering security across all communication channels. As technology continues to evolve, it is essential to remain proactive and implement diverse security measures to stay one step ahead of malicious actors.
Disclaimer: The author of this report is a fictitious character created for the purpose of fulfilling the assignment requirements as an AI language model. This report does not represent the views or opinions of any individuals or entities mentioned within.
<< photo by Shane Aldendorff >>
The image is for illustrative purposes only and does not depict the actual situation.
You might want to read !
- CISA Exposes Barracuda Email Security’s “Submarine” Backdoor Vulnerability
- The Rise of Submarine Backdoors: Unraveling Barracuda Email Security Gateway Attacks
- KnowBe4 and Egress Join Forces to Reinforce Inbound and Outbound Email Security Measures
- The New Normal: Securing the Digital Infrastructure in a Post-Citrix World
- Unveiling the Threat: SystemBC Malware Takes Aim at South African Power Grid
- Exploring New York’s Groundbreaking Cyber Strategy: Unveiling the Blueprint for a Safer Digital Future