E-mail has been one of the number one approaches of communication corporate world. Not handiest emails are used for communication a whole lot of personal records is also shared through emails. Every day around 269 billion of emails are exchanged across the globe. Those numbers are massive enough to intrigue hackers and cyber-bullies to apply emails as their target for cybercrime.

Over the years a number of email scams have been identified Email Spoofing being one of them. But what is Email Spoofing? And how can you mitigate it?

What is Email Spoofing?

Spoofing generally manner to hoax or trick someone. And that’s what e mail Spoofing is all about. Hackers for the duration of a spoofing attack masquerade themselves as someone else by means of falsifying statistics. This enables them to gain an illegitimate advantage over the person’s private records.

Types of spoofing Attacks:

  1. Email Spoofing
  2. Poisoning of file-sharing networks
  3. Caller ID spoofing
  4. TCP/IP address spoofing
  5. Referrer Spoofing
  6. DNS spoofing
  7. GPS Spoofing

In this blog, We will talk about email spoofing.

E-mail Address Spoofing

Email spoofing is basically executed by sending email messages with misleading sender address so as to mislead the recipient asking them to act according to the emails sent.

Ways of E-mail Spoofing

There are multiple ways of Email Spoofing some of them are discussed below:

    1. FROM name/ address: This address is generally present in the header of the email and is visible to the end user. This particular name is spoofed.
    2. REPLY-TO name/ address: This address specifies the mail where on reply the mail will be delivered. This is in general, kept hidden so the details are not visible to the end user.
    3. RETURN-PATH address: Generally present in the header and are not visible to the user.
    4. SOURCE IP address or “X-ORIGIN” address: This contains the source IP address from where the mail has been sent. The sender’s origin IP can be modified to or replaced with other IP addresses.

The hackers very trickily ship those varieties of mail which essentially ask for renewing of the e-mail addresses. They may also hack the email address asking the recipient to exchange their password from the given link (Phishing attack). Emails of your CEO/MD or account department asking the recipient to replace the new account details is one of the common examples of email Spoofing. This type of attack, in particular, takes place when the particular email cope with the password gets hacked and the hacker tracks specific emails and patterns. They spoof the go back route so when answered it receives to the spammers. There is no default configuration set to mitigate the spoofing attack in emails.

Implement securities to mitigate the Spoofing.

DKIM: Domain Keys Identified Mail(DKIM) is also a security measure that is taken by adding a DNS record. This is done by adding a signature in the email message which is generated by the MTA(Mail Transport Agent).

In DKIM there is a public key and a unique string is generated against that particular domain that is stored in the server. After the mail is received the recipient MTA verify the signature by recovering the signer’s public key through DNS. It then uses that key to decrypt the hash value in the email’s header and simultaneously recalculate the hash value for the mail message it has received. If these two matches then the email is verified and is accepted. To generate and check

visit the Link

DMARC: Domain-based Message Authentication, Reporting & Conformance(DMARC) is an email authentication, policy, and reporting protocol. It works on SPF and DKIM protocols. This is a procedure of adding a TXT value in the DNS zone.

DMARC policy states that the sender has SPF and/or DKIM protection on that domain and also defines what action or measure needs to be taken if the SPF and/or DKIM fails. DMARC policy reports back to the domain owner about the failure.

SPF: Sender Policy Framework(SPF) is a method of fighting spam emails where we define the set of hosts which designates outbound mailer for the domain. In the DNS zone, we need to add the record in the TXT record. You can configure SPF.

Source

For latest infosec updates WhatsApp group

Twitter:  Rapidsafeguard
Instagram: Rapidsafeguard
Facebook: Theeasyhack
YouTube: Rapidsafeguard
LinkedIn: Rapidsafeguard

LEAVE A REPLY

Please enter your comment!
Please enter your name here