October 22, 2015 By Douglas Bonderud 2 min read

Email spam is a problem. While overall numbers have been dropping, Securelist reported that in Q2 2015, more than 50 percent of all email traffic came from spammers. What’s more, malicious actors have changed tactics to focus on the next generation of tech-savvy consumers: Rather than looking for bank details or personal information, new phishing emails target social connections while malware-carrying attachments are camouflaged to look like antivirus or OS updates. But advancements in detection, particularly the DMARC protocol, have the potential to send spam packing.

Spam Has an Easy Way In

As noted by CSO Online, one of the easiest ways for attackers to convince victims their emails are genuine is by spoofing the sender address. If users believe the message really is from Microsoft, their antivirus company or a trusted friend, they’re far more likely to open, read and even download an attachment. And once attackers have access to a user’s system, they can both send emails from an infected account and use contact list data to spoof a whole new set of addresses.

While early spam-detection efforts focused on message content or relied on users to self-identify bad emails, attackers have quickly graduated to a new level of sophistication by lifting company logos, including working phone numbers and generally brushing up on their grammar. The result? Fake and legitimate messages look and sound almost identical.

DMARC-ation

Fortunately, Google and Yahoo have a plan: the Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol. According to Threatpost, DMARC takes a hard line against email spoofing by checking all messages against both Domain Keys Identified Mail (DKIM) and Sender Policy Framework (SPF) validation systems.

DKIM relies on a wrapped cryptographic signature to verify the sender domain, while SPF lets senders specify which hosts are able to carry their messages, making spoofed emails easy to identify. In combination, the DMARC protocol makes it almost impossible for spam to slip through — if both the DKIM and SPF checks aren’t successful, the message is quarantined.

Under the new DMARC system, senders can provide information to recipients on what they can do if legitimate emails aren’t getting through, while recipients can send feedback to senders letting them know why their messages were flagged. Yahoo is set to implement the protocol for its ymail.com and rocketmail.com services by Nov. 2, 2015, while Google says it’s moving to a “strict” DMARC policy by June of next year.

While it’s unlikely that even DMARC can completely eliminate spam, it’s a step in the right direction; make spoofing messages hard enough for attackers and they’ll start looking somewhere else. Even with DMARC up and running, however, users can’t get overconfident: Better safe than spoofed.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today