Mailsploit Emailing Spoofing
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
The header of the email is modified in such a way that the mail clients ignore the real from address and show the spoofed email address. The "Reply To" is also modified in the headers to ensure the glitch isn't noticed. Using this method circumvents spoofing protection mechanisms such as DMARC (DKIM/SPF) and spam filters.
In addition to the spoofing vulnerability, some of the tested applications also proved to be vulnerable to XSS and code injection attacks.
Last edited: 17 February 2020 11:34 am