Butlletí De Seguretat De Mailsploit

Total Page:16

File Type:pdf, Size:1020Kb

Butlletí De Seguretat De Mailsploit Butlletí de seguretat de MailSploit Desembre 2017 Sumari 1. Resum executiu ...............................................................................................................3 2. Descripció .........................................................................................................................3 3. Impacte .............................................................................................................................3 4. Mesures ............................................................................................................................4 5. Referències ......................................................................................................................4 2 1. Resum executiu S’ha publicat una vulnerabilitat anomenada MailSploit que afecta a més de 30 clients de correu electrònic i permet a un atacant enviar un correu electrònic que mostri una adreça remitent arbitrària al destinatari. 2. Descripció El 5 de Desembre de 2017, es va fer pública una vulnerabilitat, anomenada MailSploit, que permet a un atacant enviar un correu electrònic que mostri una adreça remitent arbitrària al destinatari. Aquesta nova vulnerabilitat s’introdueix degut a que la majoria dels clients de correu electrònic i les interfícies web no tracten adequadament la cadena després de la descodificació i això permet la realització amb èxit d’aquest atac de falsificació de correu electrònic. Per exemple, introduint la següent direcció intencionadament dissenyada fa que en iOS i en macOS (Mail.app) mostrin al destinatari del correu electrònic l’adreça ‘[email protected]' en comptes de la real: From: =?utf-8?b?${base64_encode('[email protected]')}?==?utf-8?Q?=00?==?utf- 8?b?${base64_encode('([email protected])')}[email protected] Cal destacar que els mecanismes de “anti-spoofing” com SPF, DKIM o DMARC no son efectius amb aquesta vulnerabilitat ja que aquesta es ocasionada per com tracten dels dades del “From” en l’aplicació. 3. Impacte L’impacte d’aquesta vulnerabilitat és alt, ja que permet realitzar un atac on es suplanta el camp “from” d’un correu electrònic i permet realitzar atacs d’enginyeria social elaborats degut a que els mecanismes de “anti-spoofing” no son efectius. Apart, afecta a una gran quantitat de productes: Clients Mail: Apple Mail.app (MACOS, IOS) Claws Mail / Sylpheed (WINDOWS) TypeApp (ANDROID, IOS) 3 Mozilla Thunderbird ≤ 52.5.0 Spark ≤ 1.4.1.392 (MACOS) AquaMail (ANDROID) (MACOS, WINDOWS) Mail for Windows 10 (WINDOWS) Spark (IOS) Opera Mail (MACOS, WINDOWS) MACOS, MACOS, Microsoft Outlook 2016 ( ProtonMail (ANDROID IOS) Postbox ≤ 5.0.18 ( WINDOWS) WINDOWS) ANDROID, MACOS, Yahoo! Mail (IOS) Polymail (MACOS) Newton ( WINDOWS) Yahoo! Mail (ANDROID) Airmail ≤ 3.3.3 (MACOS) Guerrilla Mail (ANDROID) Email Exchange + by OE Classic (WINDOWS) BlueMail ≤ 1.9.2.62 (ANDROID) MailWise (ANDROID) AOL Mail (ANDROID) Mailbird (WINDOWS) eM Client (WINDOWS) ANDROID, SeaMonkey ≤ 2.4.8 8 TouchMail (WINDOWS) Gmail / Inbox by Gmail ( IOS) (MACOS, WINDOWS) Clients Mail Web: Yahoo! Mail (new interface in Hushmail Microsoft Office 365 beta) Openmailbox.org Mailfence Gmail Open Xchange (Mailbox.org, Microsoft Outlook Web Fastmail Namecheap Private Email...) ProtonMail Microsoft Exchange 2016 GMX / Mail.com / 1&1 4. Mesures Per solucionar aquesta vulnerabilitat s’ha d’actualitzar el client de mail a l’última versió disponible i seguir les indicacions del fabricant. 5. Referències MailSploit: https://www.mailsploit.com 4 .
Recommended publications
  • Free Email Software Download Best Free Email Client 2021
    free email software download Best Free Email Client 2021. This article is all about best free email clients and how they can help you be more productive. We also talk about Clean Email, an easy-to-use email cleaner compatible with virtually all major email services. But before we go over the best email clients for 2021, we believe that we should first explain what advantages email clients have over web-based interfaces of various email services. Clean Email. Take control of your mailbox. What Is an Email Client and Why Should I Use One? If you’re like most people, you probably check your email at least once every day. And if you’re someone whose work involves communication with customers, clients, and coworkers, the chances are that you deal with emails all the time. Even though we spend so much time writing, forwarding, and managing emails, we hardly ever pause for a moment and think about how we could improve our emailing experience. We use clunky web interfaces that are not meant for professional use, we accept outdated applications as if alternatives didn’t exist, and we settle for the default email apps on our mobile devices even though app stores are full of excellent third-party email apps. Broadly speaking, an email client is a computer program used to access and manage a user’s email. But when we use the term email client in this article, we only mean those email clients that can be installed on a desktop computer or a mobile device—not web-based email clients that are hosted remotely and are accessible only from a web browser.
    [Show full text]
  • The Sweet Setup -- Airmail Tips and Tricks Copy
    Airmail Tips & Tricks Written and published by the fine folks at The Sweet Setup. thesweetsetup.com 1 of 16 About The Sweet Setup We enjoy spending an inordinate amount of time and energy to research, test, and find the very best apps. The Sweet Setup exists to highlight the software that has proven to be the best, not necessarily the newest. Who wants just any weather app? Not us. We want the best! And so do you. That’s why our goal is to help you (and ourselves) find the best apps for your iPhone, iPad, and Mac. Our Other Websites The Focus Course: Get clarity about your goals and priorities, build traction on your side projects, stop procrastinating, bring your life into focus. Tools & Toys: Gear guides and reviews every day. Time Management Training: Scheduling, prioritizing, and time management training to help you get (and stay) in control of your time an attention. 2 of 16 Airmail Tips & Tricks 1. About Airmail for Mac 2. Using Send & Archive 3. How to Snooze Messages 4. How to use Quick Reply 5. Marking Messages as Spam 6. Using and Customizing the Swipe Gestures for Airmail on iOS All written content and photography is original and copyright 2017 Blanc Media, LLC Airmail, the Airmail logo, and its design are registered trademark of Bloop. airmailapp.com, bloop.info The Sweet Setup and Blanc Media are not affiliated with Airmail or Bloop. 3 of 16 4 of 16 About Airmail Airmail is marketed as being a “lightning-fast email client for Mac,” and it certainly doesn’t disappoint.
    [Show full text]
  • Downloadable Email Program for My Pc 32 Best Free Email Clients
    downloadable email program for my pc 32 Best Free Email Clients. Here are 32 best free email client software . These let you manage and access all of your email accounts in one single place easily. All these email client software are completely free and can be downloaded to Windows PC. These free software offer various features, like: can be used with IMAP, SMTP, POP3 and Gmail, keeps your emails safe and secure, lets you open various emails simultaneously, provide protection from spam, lets you view your emails offline, manage and access all of your email accounts in one single place, supports PH, LDAP, IMAP4, POP3 and SMPT mail protocols etc. So, go through this list of free email client software and see which ones you like the most. Thunderbird. Thunderbird is a free and handy email client software for your computer. It can be used with IMAP, SMTP, POP3 and Gmail. It will also work with email accounts provided by MS Exchange Server. The user interface of Thunderbird is tabbed. It lets you open various emails simultaneously. Thunderbird keeps your emails safe and secure. It also has special filters for filtering the mail. Windows Live Mail. Windows Live Mail is a free email client for your computer. It works with various email accounts. It lets you access Yahoo, Gmail, Hotmail and emails from different servers which supports POP3 and SMTP. Its security features are excellent it will also provide protection from spam. You can also view your emails offline in this freeware. Zimbra Desktop. Zimbra Desktop is a free email client.
    [Show full text]
  • LEGAL TECHNOLOGY Insider
    CHARLES CHRISTIAN’s LEGAL TECHNOLOGY iNSIDER THE ESSENTIAL GUIDE TO WHAT’S HOT (AND WHAT’S NOT) IN LAW OFFICE SYSTEMS ➦ workgroup friendly office automation WORDPERFECT suite that should find a ready place in SET FOR JUNE law firm and IT suppliers’ fee earner desk- top development strategies. COMEBACK For advanced users, the suite has The legal world’s favourite word- Internet and multimedia enhancements. processing software WordPerfect is While more traditional wordprocessor scheduled to make its comeback in users should find the new “as you go” June with the launch of the new 32- features in WordPerfect 7 improve pro- IN THIS bit Windows 95 compliant Version 7.0. ductivity by allowing greater flexibility EDITIONÉ At the same time WordPerfect’s new over checking spelling, reformatting docu- owners Corel will also be launching ments and changing numbering. Microsoft to PerfectOffice 7.0, the latest upgrade In addition, the suite contains a Exchange Mail… 2 to the company’s all-in-one office copy of IBM’s VoiceType Control software automation suite. so users can actually control applications Shakespeare LEGAL TECHNOLOGY iNSIDER has by spoken commands, such as “open file”, looking for recently been looking at the pre-release “print document” etc. co-authors… 3 Beta 2 version of the software and while there remains the possibility of further ☞ Comment… A lot can happen in the LOTIES awards changes being made to the final version, two months between now and the provi- latest… 4 it is clear Corel is pulling out all the stops sional 6th June launch date but on first to ensure WordPerfect’s second coming impressions it seems Corel has devised a Roll your own returns the product to its former glory as wordprocessing/office suite that is more accounts with a market leader.
    [Show full text]
  • Review, Email Clients with Source Code Editing
    Review, Email Clients with Source Code Editing By Micheline Johnson Updated 2013-12-05 Why is source code editing desirable? It enables the addition of variable indenting and hanging indents, tables, images, charts, videos etc. the replacement of <p> tags with <div> tags, if para spacing is not required. Wikipedia lists most email clients. Of these, the free Windows or cross-platform GUI email clients are included in the Appendix. Of these, the current mainstream desktop GUI email clients include: 1. Outlook, overkill for most purposes, and is not free. 2. Outlook Express, not available for Windows 7 3. Windows Live Mail 4. Mozilla Thunderbird, does not natively support HTML editing or tables. 5. Eudora v7.1, runs on Microsoft Windows XP/2000 (http://www.eudora.com/download/). It has problems with Windows 7, see http://mcaf.ee/cxsw8 . It runs on Windows XP, and does not appear to support editing HTML source code, or tables. 6. Eureka Email. It is very difficult to uninstall, see http://mcaf.ee/1q0ka , so I did not test it. 7. Pegasus Mail. Pegasus v4.63 allows the insertion of a table and the editing of the number of rows or columns of that table; but it does not support editing of HTML source code. It supports hanging indents to increments of one tab spacing, which is very crude. 8. DreamMail 9. FoxMail 10. SeaMonkey. http://www.seamonkey-project.org/. Allows inserting of tables. Appears to allow insertion of HTML code, but does not allow viewing of the entire HTML source code. 11. Netscape Messenger used to have an HTML editor.
    [Show full text]
  • Application Support with TRITON AP-ENDPOINT DLP
    Application Support with TRITON AP-ENDPOINT DLP Endpoint Applications| TRITON AP-ENDPOINT DLP | Version 8.1.x You can monitor any number of applications for data loss on endpoint clients when they are off network. Websense has analyzed the metadata for more than a hundred applications and can monitor these with great accuracy. (They are listed in this article.) You can add other applications to the list. If you want to analyze the applications based on their metadata, you can use a utility that Websense provides. Built-in support, page 1 Importing other applications, page 11 Built-in support Endpoint Applications | TRITON AP-ENDPOINT DLP | Version 8.1.x Following are the applications that you can choose to monitor on the endpoint when you set up your endpoint policy in the Data Security manager. This includes software applications, web applications, and cloud applications. Endpoint Applications 1 Application Support with TRITON AP-ENDPOINT DLP Also noted is whether the application is supported on Windows endpoint, Mac endpoint, or both, and the type of operations that can be analyzed by TRITON AP-DATA. Group Application Windows Mac Supported Default Operations Operations Browsers Chrome Copy/Cut Copy/Cut Paste Paste Firefox File Access Internet Explorer Internet Explorer 10, 11 (store app) Opera Internet Browser Safari Web Browser Torch Browser CD Burners Acoustica Copy/Cut File Access MP3 CD Paste Burner File Access Alcohol 120% Alcohol Launcher CD Mate Disk Utility Nero Burning ROM Roxio Creator Classic iTunes 2 TRITON AP-ENDPOINT
    [Show full text]
  • Forcepoint DLP Endpoint Applications
    Applications Monitored in the Endpoint Application Channel for Forcepoint DLP Endpoint Endpoint Applications | Forcepoint DLP Endpoint | v8.4.x You can monitor the operations performed by end users on any number of applications to prevent data loss from endpoint clients both on and off network—operations such as file access, cut or copy, and paste. Forcepoint has analyzed the metadata for more than a hundred applications, and has provided templates for these applications so you can monitor them in the Endpoint Application channel. This document lists the predefined application templates by Application Group and lists the operating systems and operations that are monitored. While Forcepoint has analyzed the metadata for these applications, Forcepoint has not formally tested and certified these applications in all environments for each Forcepoint DLP Endpoint release. After selecting a specific application to monitor, test the application file access monitoring in your environment and reconfigure if needed. This document also describes how to import user-defined applications if desired. ● Built-in application templates, page 1 ● Importing other applications, page 11 Built-in application templates Endpoint Applications | Forcepoint DLP Endpoint | v8.4.x In the Forcepoint Security Manager, select Main > Resources > Endpoint Applications to choose the applications to monitor for the Endpoint Application channel, or select Endpoint Application Groups to select entire groups of applications, such as encryption software or browsers. Following are the application templates that you can choose to monitor on the endpoint when you set up your endpoint policy in the Forcepoint Security Manager. This includes software applications, web applications, and cloud applications. Forcepoint Endpoint Applications 1 Applications Monitored in the Endpoint Application Channel for Forcepoint DLP Endpoint Also noted is whether the application is supported on Windows endpoints, Mac endpoints, or both, and the type of operations that can be analyzed by Forcepoint DLP.
    [Show full text]
  • Read Receipt Gmail App Iphone
    Read Receipt Gmail App Iphone disingenuouslyReactive Tait opiating when cramoisy his leatherneck Aub supersaturates goose aboard. unstoppably Rabi usually and chummed underfoot. person-to-person Carl deputizes orassembled? embrace It puts the read receipt but responding to every time zone but your email sender, the paid apps In this photo illustration the logo of the Gmail app homepage is shut on the screen of an iPhone in front probably a computer screen showing a Google logo on July 04 201 in Paris France. Avoid your favorite feature is source of gmail by the address to use and is the location with hubspot to disable gmail: app read receipt gmail app iphone or update. Do once i use read receipt gmail app iphone or use the coming to a simple read receipt is currently only accept this, but opting out. With other valid email android read receipt gmail app iphone or not support, streak that the future. Each of clicks on android app to our lifestyle email at the google serves cookies are served by now you read receipt gmail app iphone or premium. You read receipts are. The little else, read receipt gmail app iphone. These were open the list have read receipt gmail app iphone or may unsubscribe you can you know about helping others may have been opened the ads and is? Thank you should or outlook, the read receipt gmail app iphone or inbox when those ideas and does gmail notifications that organization will take your browsing on the. Gallery android app store is used did, attachment view a second, google announced the read receipt gmail app iphone or modified by people at end of the email tracking button.
    [Show full text]
  • Forest Products Buyer
    The Softwood Forest Products www.softwoodbuyer.com Buyer NAWLA Special Edition www.millerwoodtradepub.com/publications/nawla-special-issue/ @www.millerwoodtradepub @www.millerwoodtradepub These are just a few companies that advertise in The Softwood Forest Products Buyer NAWLA Special Edition and other issues of the publication targeting your markets! ...but nothing has proven to be as effective as advertising in your paper. Each time one of our Ads appears in The Softwood Buyer, we always get calls, which proves to us that people take the time to read it. That fact alone gives us, as the advertiser/manufacturer, the opportunity to let our current customers know we are a progressive company and potentially reach new customers as well. You and your staff do an excellent job at canvassing the different people in our industry to get a ‘feel’ for what’s really happening and then report it for the benefit of all of us. Ralph Schmidt Columbia Cedar ...The Softwood Buyer has enabled us to keep our name, products and services in front of our customers and potential customers...we ...our Ads are in the right are continuing our Ad program. place. We know the people Matt Duprey we do business with read Hancock Lumber Co. ‘The Softwood Buyer’- both suppliers and buyers. To us it makes perfect sense for our Ads to be seen in a newspaper that was created to put suppliers and buyers together and that is regularly read by ...I have advertised in the paper since 1996, industry members. and I am happy with the results! The Softwood Buyer is not only building my brand, but also Chad Findlay letting my customers and potential customers West Bay Forest Products know the products and services Limington Lumber has to offer all year long.
    [Show full text]
  • Shoviv MBOX Converter
    Shoviv MBOX Converter Shoviv MBOX Converter Shoviv MBOX Converter - Convert in PST, Live Exchange, Office 365, MSG, EML Copyright © 2018 Shoviv Software Private Limited Shoviv MBOX Converter Table of Contents 1. About Shoviv MBOX Converter 1.1 Introduction 1.2 Key Features 1.3 Supported Email Client 1.4 System Requirements 2. Installation and Uninstallation 2.1 Installation 2.2 Uninstallation 3. Add MBOX 3.1 Add MBOX 4. Export MBOX 4.1 In MSG 4.2 In EML 4.3 In Outlook PST 4.4 In Live Exchange 4.5 In Office 365 4.6 In Selected Profile 5. Help 5.1 About MBOX 5.2 Visit Home Page 6. Activation 6.1 Activate License 7. Buy Now 7.1 Buy Now 8. Legal Notice 8.1 Copyright 8.2 Trademarks 8.3 Disclaimer 8.4 License Agreement Copyright © 2018 Shoviv Software Private Limited Shoviv MBOX Converter Introduction to Shoviv MBOX Converter Shoviv MBOX Converter Export MBOX Files to Outlook PST, Live Exchange Server and Office 365 Mailbox,MSG, EML Shoviv MBOX Converter is congenial email migration software for the different email client that export MBOX to Outlook PST, Live Exchange Server & Office 365 Mailbox without any data loss. It also exports items from MBOX file to EML and MSG file format. The software supports up to 20 email client and export MBOX file from those Email Clients (AppleMail, Thunderbird, Eudora, Entourage, PocoMail, Spicebird, , SeaMonkey , Mozilla Mail, Mulberry, OperaMail, Netscape, PostBox, ClawsMail, Evolution, Sylpheed, PowerMail, Gmail/WebMail, GayazMail, Sparrow, Gnu and The Bat) to MS Outlook PST file. Support to exports multiple MBOX of different email client at one time without losing any data from the mailboxes.
    [Show full text]
  • Ios Email Apps with Read Receipts
    Ios Email Apps With Read Receipts Cryptorchid Pincus abandons: he unfenced his fatty modernly and molto. Kalvin behooved his Sonia hap alphabetically or bellicosely after Marmaduke eulogising and bastinaded secondly, soft-centred and only. Uncaught Chen sag some hulls and dartling his repleteness so accumulatively! Know exactly the app with your inbox to the. It also tracks replies to load given email. You left swipe actions automatically checks if it civil and receipts with an email has exposed to learn more natural language. As useful as he Read Receipts feature will be, while another the feature meant for everyone else. Newton will raise you, Google Drive, we propose going to talk but How many Turn on fist Read Receipt. Was read receipts with app are an apps. Undo send read receipts with app with read the apps that lets you can. Your Facebook account is tied to an email. Now do you know of front an app? This tool enables you to personalize multiple email accounts. With options and receipts with email apps read. Want to see how engaged your audience is with your content? Open the Mac App Store to buy and download apps. Airmail features per account notifications, question the privacy offered by VPN from Google. Avoid your next embarrassing mistake when sending an important email. Timeline of receipts when you have access is among the android email with read by tapping the calendar. When the of has opened your email to merge the delivery and read receipts on Outlook. Read receipts can help playing this. Chuck is an interesting app that shows messages in your inbox as cards or stacks, and check Request a Read Receipt option.
    [Show full text]
  • Efail: Breaking S/MIME and Openpgp Email Encryption Using Exfiltration Channels (Draft 0.9.0)
    Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels (draft 0.9.0) Damian Poddebniak1, Christian Dresen1, Jens Muller¨ 2, Fabian Ising1, Sebastian Schinzel1, Simon Friedberger3, Juraj Somorovsky2, and Jorg¨ Schwenk2 1Munster¨ University of Applied Sciences 2Ruhr University Bochum 3KU Leuven Abstract End-to-end encryption. While transport security be- tween mail servers is useful against some attacker sce- OpenPGP and S/MIME are the two prime standards narios, it does not offer reliable security guarantees re- for providing end-to-end security for emails. We de- garding confidentiality and authenticity of emails. Re- scribe novel attacks built upon a technique we call mal- ports of pervasive data collection efforts by nation state leability gadgets to reveal the plaintext of encrypted actors, large-scale breaches of email servers, revealing emails. We use CBC/CFB gadgets to inject malicious millions of email messages [2–5], or attackers compro- plaintext snippets into encrypted emails that abuse ex- mising email accounts to search the emails for valuable isting and standard conforming backchannels, for exam- data [6, 7] underline that transport security alone is not ple, in HTML, CSS, or x509 functionality, to exfiltrate sufficient. the full plaintext after decryption. The attack works for End-to-end encryption is designed to protect user data emails even if they were collected long ago, and is trig- in such scenarios. With end-to-end encryption, the email gered as soon as the recipient decrypts a single mali- infrastructure becomes merely a transportation service ciously crafted email from the attacker. The attack has for opaque email data and no compromise – aside from a large surface, since for each encrypted email sent to n the endpoints of sender or receiver – should affect the recipients, there are n+1 mail clients that are susceptible security of an end-to-end encrypted email.
    [Show full text]