Page 22 - Cyber Defense eMagazine - October 2017
P. 22

What You Need To Know About Anti-Phishing Standards – Part 1

               by Marc Laliberte, Information Security Threat Analyst, WatchGuard Technologies

               Phishing  emails  are  a  popular  malware  delivery  vehicle  for  attackers.  In  fact,  according  to
               Verizon’s  2017  Data  Breach  Investigations  Report,  two-thirds  of  all  malware  in  2016  was
               installed  via  email  attachments.  Often  the  most  difficult  part  in  crafting  a  phishing  email  is
               designing it in such a way that the victim will believe it and follow the instructions.


               While there are many ways for an attacker to increase the chances of success for their phishing
               emails, one of the most effective methods involves spoofing the message to appear to come
               from a trusted source. Before we can dive in to how the attackers spoof the sender and how to
               protect against it, we first need to go over some email message basics.

               The Basics

               The format and process for most email messages is actually very similar to a traditional snail
               mail message. An email message includes an envelope with routing address information, and a
               message letter that sits inside the envelope. The envelope address headers are just like what
               you would expect to see in a traditional mail envelope. There is a header for the sender, called
               MAIL  FROM,  and  a  header  for  the  recipient,  called  RCPT  TO.  In  the  case  of  a  CC  or  BCC
               recipient, the sending mail server simply adds more RCPT TO headers to send digital copies of
               the message to the other recipients. Email servers use these envelope headers when deciding
               where  to  route  a  message  and  where  to  send  delivery  failure  messages  if  any  issues  are
               encountered along the way.

               Inside  the  message  envelope  sits  the  email  message  itself.  The  message  also  uses  several
               headers, including separate headers for the sender (FROM header), recipient (TO header), a
               header  for  the  message  subject  (Subject  header),  and  a  timestamp  for  the  message  (Date
               header),  among  others.  Your  email  client  uses  these  message  headers,  not  the  envelope
               headers, when displaying details like the sender, recipients, and subject of a message.

               Most  email  clients  trust  these  message  headers  as-is.  This  means  an  attacker  can  spoof  a
               message’s  FROM  header to  be  any  address  they  want,  whether  it  be your  company’s  CEO,
               your  best  friend,  or  your  bank.  By  spoofing  the  sender  address  in  their  phishing  emails,
               attackers make the context of their message more convincing, increasing the chances that the
               victim will fall for it. In fact, nearly all malicious e-mail messages use a spoofed sender address.
               Luckily, there are technologies and standards available to protect yourself and your users from
               sender address forgery.

               SPF

               Sender  Policy  Framework  (SPF)  is  an  open  standard  developed  by  the  Internet  Engineering
               Task  Force  (IETF),  designed  to  combat  sender  address  forgery  in  envelope  MAIL  FROM
               headers. SPF enables organizations to specify what servers are allowed to send emails with an
               envelope MAIL FROM address in their domain by using DNS records. Recipient mail servers
               can then use these special DNS records to confirm that a message from any given domain truly
               came from that domain.

                    22   Cyber Defense eMagazine – October 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   17   18   19   20   21   22   23   24   25   26   27