October 22, 2015 By Douglas Bonderud 2 min read

Email spam is a problem. While overall numbers have been dropping, Securelist reported that in Q2 2015, more than 50 percent of all email traffic came from spammers. What’s more, malicious actors have changed tactics to focus on the next generation of tech-savvy consumers: Rather than looking for bank details or personal information, new phishing emails target social connections while malware-carrying attachments are camouflaged to look like antivirus or OS updates. But advancements in detection, particularly the DMARC protocol, have the potential to send spam packing.

Spam Has an Easy Way In

As noted by CSO Online, one of the easiest ways for attackers to convince victims their emails are genuine is by spoofing the sender address. If users believe the message really is from Microsoft, their antivirus company or a trusted friend, they’re far more likely to open, read and even download an attachment. And once attackers have access to a user’s system, they can both send emails from an infected account and use contact list data to spoof a whole new set of addresses.

While early spam-detection efforts focused on message content or relied on users to self-identify bad emails, attackers have quickly graduated to a new level of sophistication by lifting company logos, including working phone numbers and generally brushing up on their grammar. The result? Fake and legitimate messages look and sound almost identical.

DMARC-ation

Fortunately, Google and Yahoo have a plan: the Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol. According to Threatpost, DMARC takes a hard line against email spoofing by checking all messages against both Domain Keys Identified Mail (DKIM) and Sender Policy Framework (SPF) validation systems.

DKIM relies on a wrapped cryptographic signature to verify the sender domain, while SPF lets senders specify which hosts are able to carry their messages, making spoofed emails easy to identify. In combination, the DMARC protocol makes it almost impossible for spam to slip through — if both the DKIM and SPF checks aren’t successful, the message is quarantined.

Under the new DMARC system, senders can provide information to recipients on what they can do if legitimate emails aren’t getting through, while recipients can send feedback to senders letting them know why their messages were flagged. Yahoo is set to implement the protocol for its ymail.com and rocketmail.com services by Nov. 2, 2015, while Google says it’s moving to a “strict” DMARC policy by June of next year.

While it’s unlikely that even DMARC can completely eliminate spam, it’s a step in the right direction; make spoofing messages hard enough for attackers and they’ll start looking somewhere else. Even with DMARC up and running, however, users can’t get overconfident: Better safe than spoofed.

More from

How I got started: Incident responder

3 min read - As a cybersecurity incident responder, life can go from chill to chaos in seconds. What is it about being an incident responder that makes people want to step up for this crucial cybersecurity role?With our How I Got Started series, we learn from experts in their field and find out how they got started and what advice they have for anyone looking to get into the field.In this Q&A, we spoke with IBM’s own Dave Bales, co-lead X-Force Incident Command…

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally.The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets.Who is exploiting the NGFW zero-day?As of now, little is known about the actors behind the…

How TikTok is reframing cybersecurity efforts

4 min read - You might think of TikTok as the place to go to find out new recipes and laugh at silly videos. And as a cybersecurity professional, TikTok’s potential data security issues are also likely to come to mind. However, in recent years, TikTok has worked to promote cybersecurity through its channels and programs. To highlight its efforts, TikTok celebrated Cybersecurity Month by promoting its cybersecurity focus and sharing cybersecurity TikTok creators.Global Bug Bounty program with HackerOneDuring Cybersecurity Month, the social media…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today