Proofpoint Vulnerability Exploited for Phishing Campaign
Threat actors have been exploiting a flaw in Proofpoint’s email protection service, impersonating popular brands as part of a phishing campaign. Learn more about the flaw and its threat to Proofpoint users.
- Threat actors have leveraged a vulnerability in Proofpoint’s email protection service to run a wide-ranging phishing campaign.
- The campaign has sent millions of emails impersonating popular companies such as IBM, Best Buy, Walt Disney, and Nike.
A vulnerability in security firm Proofpoint’s email protection service has been discovered. This vulnerability enabled attackers to spoof millions of emails from legitimate companies such as IBM, Disney, and Coca-Cola, posing severe risks to organizations using the service.
Researchers at Guardio Labs first reported the flaw. According to them, a technique called echo spoofing manipulates Proofpoint’s email routing settings to send emails that appear to be sent by trusted sources. This, in turn, raises the chances of victims falling to associated scams.
See More: US Government Indicts North Korean Hacker Rim Jong Hyok, Offers $10M Reward
The Vulnerability
The vulnerability lies in Proofpoint’s email protection settings. These emails start at an SMTP (simple mail transfer protocol) server, go through an Office365 Online Exchange server, and later enter a domain-specific Proofpoint server. Attackers can circumvent security measures that would generally warn users about suspicious emails with unique IDs of the spoofed brand, which can be found in mail exchanger (MX) records.
This can involve manipulating Domain-based Message Authentication, Reporting, and Conformance (DMARC) records, which can be used to verify email senders. These records can be spoofed to send phishing emails that bypass security filters to reach inboxes directly.
Proofpoint’s server is typically the final checkpoint for incoming and outgoing emails. An attacker only needs to find a way to send spoofed emails through the Proofpoint relay. Attackers can do this by injecting spoofed headers in the phishing email via an Office 365 account to relay emails from a malicious source. A misconfiguration issue resulting in excessive permission ensures that even spoofed emails are correctly signed and authenticated.
Considering how the SMTP protocol works, authentication is not required to add approved email services, as that process is conducted via IP addresses. Proofpoint has pre-approved a list of IPs associated with trusted email services such as Office365.
The sophisticated phishing campaign is being run on a wide scale. The fake emails can fool security measures such as Sender Policy Framework and DomainKeys Identified Mail. The flaw is used to impersonate major brands, potentially exposing millions of users of the impersonated brands to theft of information such as financial data, login credentials, and personal information. Clicking on the spoofed email links to fraudulent websites often includes attractive offers by the company.
Implications and Mitigation
Proofpoint was alerted to the problem and has issued patches to mitigate vulnerability exploitation. The flaw’s discovery highlights the need for updating email security protocols and continuous monitoring. Organizations should review security settings and apply patches and updates promptly.
Proofpoint deployed an update that automatically attached unique vendor-specific headers for Exchange to outgoing emails containing the Office365 account name. The company has also warned customers about the risk of configurations with unnecessary permissions, urging them to monitor for signs of misuse.
Exploiting security services like Proofpoint, which multiple organizations use, shows how seemingly strong security measures can be vulnerable. This raises concerns about the efficacy of third-party security services and the need for multi-layered approaches.
Takeaways
The vulnerability in Proofpoint’s email protection service highlights the evolving nature of the cybersecurity landscape. Organizations should be vigilant, update security measures, and consider additional security measures, including but not limited to cybersecurity insurance, to mitigate risks posed by such attacks.