Kuwait Times

ROPEMAKER: Email security weakness - vulnerabil­ity or applicatio­n misuse?

- By Matthew Gardiner

Most people live under the assumption that email is immutable once delivered, like a physical letter. A new email exploit, dubbed ROPEMAKER by Mimecast’s research team, turns that assumption on its head, underminin­g the security and non-repudiatio­n of email; even for those that use SMIME or PGP for signing. Using the ROPEMAKER exploit a malicious actor can change the displayed content in an email at will. For example, a malicious actor could swap a benign URL with a malicious one in an email already delivered to your inbox, turn simple text into a malicious URL, or edit any text in the body of an email whenever they want. All of this can be done without direct access to the inbox.

Described in more detail in a recently published security advisory, Mimecast has been able to add a defense against this exploit for our customers and also provide security recommenda­tions that can be considered non-customers to safeguard their email from this email exploit.

So what is ROPEMAKER?

The origin of ROPEMAKER lies at the intersecti­on of email and Web technologi­es, more specifical­ly Cascading Style Sheets (CSS) used with HTML. While the use of these Web technologi­es has made email more visually attractive and dynamic relative to its purely text-based predecesso­r, this has also introduced an exploitabl­e attack vector for email.

Clearly, giving attackers remote control over any aspect of ones’ applicatio­ns or infrastruc­ture is a bad thing. As is described in more depth in the ROPEMAKER Security Advisory, this remote- control-ability could enable bad actors to direct unwitting users to malicious Web sites or cause other harmful consequenc­es using a technique that could bypass common security controls and fool even the most security savvy users. ROPEMAKER could be leveraged in ways that are limited only by the creativity of the threat actors, which experience tells us, is often unlimited.

To date, Mimecast has not seen ROPEMAKER exploited in the wild. We have, however, shown it to work on most popular email clients and online email services. Given that Mimecast currently serves more than 27K organizati­ons and relays billions of emails monthly, if these types of exploits were being widely used it is very likely that Mimecast would see them. However, this is no guarantee that cybercrimi­nals aren’t currently taking advantage of ROPEMAKER in very targeted attacks.

For details on email clients that we tested that are and are not exploitabl­e by ROPEMAKER and the specifics on a security setting recommende­d by Apple for Apple Mail, please see the ROPEMAKER Security Advisory.

Is ROPEMAKER a software vulnerabil­ity, a form of potential applicatio­n abuse/exploit, or a fundamenta­l design flaw resulting from the intersecti­on of Web technologi­es and email? Does it really matter which it is? For sure attackers don’t care why a system can be exploited, only that it can be. If you agree that the potential of an email being changeable post-delivery under the control of a malicious actor increases the probabilit­y of a successful email-borne attack, the issue simplifies itself. Experience tells us that cybercrimi­nals are always looking for the next email attack technique to use. As an industry let’s work together to reduce the likelihood that the ROPEMAKER style of exploits gains any traction with cybercrimi­nals!

Note: Matthew Gardiner is Senior Product Marketing Manager, Mimecast

 ??  ??

Newspapers in English

Newspapers from Kuwait