October 22, 2015 By Douglas Bonderud 2 min read

Email spam is a problem. While overall numbers have been dropping, Securelist reported that in Q2 2015, more than 50 percent of all email traffic came from spammers. What’s more, malicious actors have changed tactics to focus on the next generation of tech-savvy consumers: Rather than looking for bank details or personal information, new phishing emails target social connections while malware-carrying attachments are camouflaged to look like antivirus or OS updates. But advancements in detection, particularly the DMARC protocol, have the potential to send spam packing.

Spam Has an Easy Way In

As noted by CSO Online, one of the easiest ways for attackers to convince victims their emails are genuine is by spoofing the sender address. If users believe the message really is from Microsoft, their antivirus company or a trusted friend, they’re far more likely to open, read and even download an attachment. And once attackers have access to a user’s system, they can both send emails from an infected account and use contact list data to spoof a whole new set of addresses.

While early spam-detection efforts focused on message content or relied on users to self-identify bad emails, attackers have quickly graduated to a new level of sophistication by lifting company logos, including working phone numbers and generally brushing up on their grammar. The result? Fake and legitimate messages look and sound almost identical.

DMARC-ation

Fortunately, Google and Yahoo have a plan: the Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol. According to Threatpost, DMARC takes a hard line against email spoofing by checking all messages against both Domain Keys Identified Mail (DKIM) and Sender Policy Framework (SPF) validation systems.

DKIM relies on a wrapped cryptographic signature to verify the sender domain, while SPF lets senders specify which hosts are able to carry their messages, making spoofed emails easy to identify. In combination, the DMARC protocol makes it almost impossible for spam to slip through — if both the DKIM and SPF checks aren’t successful, the message is quarantined.

Under the new DMARC system, senders can provide information to recipients on what they can do if legitimate emails aren’t getting through, while recipients can send feedback to senders letting them know why their messages were flagged. Yahoo is set to implement the protocol for its ymail.com and rocketmail.com services by Nov. 2, 2015, while Google says it’s moving to a “strict” DMARC policy by June of next year.

While it’s unlikely that even DMARC can completely eliminate spam, it’s a step in the right direction; make spoofing messages hard enough for attackers and they’ll start looking somewhere else. Even with DMARC up and running, however, users can’t get overconfident: Better safe than spoofed.

More from

What can businesses learn from the rise of cyber espionage?

4 min read - It’s not just government organizations that need to worry about cyber espionage campaigns — the entire business world is also a target.Multipolarity has been a defining trend in geopolitics in recent years. Rivalries between the world’s great powers continue to test the limits of globalism, resulting in growing disruption to international supply chains and economics. Global political risk has reached its highest level in decades, and even though corporate attention to geopolitics has dropped since peaking in 2022, the impact…

How I got started: AI security executive

3 min read - Artificial intelligence and machine learning are becoming increasingly crucial to cybersecurity systems. Organizations need professionals with a strong background that mixes AI/ML knowledge with cybersecurity skills, bringing on board people like Nicole Carignan, Vice President of Strategic Cyber AI at Darktrace, who has a unique blend of technical and soft skills. Carignan was originally a dance major but was also working for NASA as a hardware IT engineer, which forged her path into AI and cybersecurity.Where did you go to…

DHS awards significant grant to improve tribal cybersecurity

4 min read - The Department of Homeland Security (DHS) has awarded $18.2 million in grants through the Tribal Cybersecurity Grant Program to boost cybersecurity defenses among Native American Indian Tribes. The program takes a big step in addressing the unique digital threats faced by tribal communities — a dedicated effort to improve cybersecurity infrastructure across these regions. The $18.2 million grant is just one component of DHS's broader strategy to enhance national cybersecurity. Administered by the Federal Emergency Management Agency (FEMA) in partnership…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today