Security bug allows anyone to spoof Microsoft employee emails (techcrunch.com)
from BrikoX@lemmy.zip to cybersecurity@sh.itjust.works on 18 Jun 2024 17:50
https://lemmy.zip/post/17592103

A researcher has found a way to impersonate Microsoft corporate email accounts, which could make phishing attacks harder to spot.

#cybersecurity

threaded - newest

pleasejustdie@lemmy.world on 18 Jun 2024 18:54 next collapse

My initial question was did this “researcher” just discover SMTP Open Relay? Cause if so I can do the exact same thing by configuring my SMTP server to open relay then using telnet to connect to it and issue the SMTP commands directly and it will send the email as though sent from whatever email address I want. This has been a known issue with SMTP for decades at this point and can’t be reliably resolved with SMTP, but since the whole world uses it for email, its probably not going away any time soon. However to mitigate it as much as possible is what DMARC DNS entries are supposed to help with, by providing assurance that the email was sent by an SMTP server allowed to send email on behalf of the domain.

I used to send people emails from themselves to demonstrate why they can’t trust the “from” address when they get an e-mail.

stringere@sh.itjust.works on 18 Jun 2024 19:07 next collapse

However to mitigate it as much as possible is what DMARC DNS entries are supposed to help with, by providing assurance that the email was sent by an SMTP server allowed to send email on behalf of the domain.

+DKIM and SPF as long as we’re naming email authentication methods.

pleasejustdie@lemmy.world on 18 Jun 2024 19:10 collapse

yup, those too.

IHawkMike@lemmy.world on 18 Jun 2024 23:46 collapse

Exactly. Show me the Authentication-Results header or gtfo.

homesweethomeMrL@lemmy.world on 18 Jun 2024 20:07 next collapse

“Microsoft just said they couldn’t reproduce it without providing any details,” Koroin told TechCrunch in an online chat. “Microsoft might have noticed my tweet because a few hours ago they reopen [sic] one of my reports that I had submitted several months ago.”

lol

jemikwa@lemmy.blahaj.zone on 19 Jun 2024 02:12 collapse

The bug, according to Kokorin, only works when sending the email to Outlook accounts.

Sounds like it’s something client side or specific to Microsoft’s o365/outlook.com servers. Could be the exploit bypasses header verdicts for SPF/dkim/dmarc