This new cybercrime technique makes it easier for criminals to send fake emails

Hackers can use a flaw in SMTP servers to spoof legitimate email addresses

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Security researchers have discovered a new technique that allows threat actors to send spoofed emails with false addresses. They can use this technique to deliver highly targeted phishing emails, while avoiding being spotted byemail securitysolutions.

Timo Longin, a senior security consultant at SEC Consult, published a report on the technique, which he called SMTP smuggling.

SMTP is short for Simple Mail Transfer Protocol, and is described as a TCP/IP protocol needed to send and receive email messages. Because outbound and inbound SMTP servers handle end-of-data sequences differently, hackers can “break out of the message data” and thus “smuggle” arbitrary SMTP commands, including entire email messages.

Non-issue for Cisco

Non-issue for Cisco

Apparently, the vulnerability can be abused in servers fromMicrosoft, GMX, and Cisco, with SMTP implementations from Postfix and Sendmail also being affected.

Microsoft and GMX have already addressed the issue, but some reports have claimed Cisco has decided not to. Discussing the matter, the company apparently said SMTP smuggling isn’t exactly a vulnerability, but rather “a feature and that they will not change the default configuration."

Consequently, threat actors can still potentially smuggle emails to Cisco Secure Email instances with default configurations. SEC Consult concluded that the best course of action for Cisco users is to change their settings from “Clean” to “Allow”, as this will prevent spoofed emails with valid DMARC checks from making it into the inbox.

Phishing continues to be the primary attack vector for most threat actors out there. It is omnipresent, cheap, and can be automated. Threat actors can impersonate big brands, company managers, and similar, and use AI writers to draft emails with a sense of urgency. Victims often act on these emails (either by clicking a link or downloading an attachment) without considering the potential risks, resulting in endpoint compromise or data theft.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

ViaTheHackerNews

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

A new form of macOS malware is being used by devious North Korean hackers

Scammers are using fake copyright infringement claims to hack businesses

Belkin’s Travel Bag for Vision Pro has pockets and is way cheaper than Apple’s own case