Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Phishers leverage .gov domain loophole to bypass email validation

Phishers leverage .gov domain loophole to bypass email validation

2015/03/23

Securityweek - (International) Security researchers at Trend Micro discovered that cybercriminals responsible for a March 4 - 11 phishing attack that sent over 430,000 emails targeting American Express customers maximized the attack's effectiveness by exploiting a loophole in the way DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) email verification systems handle messages from .gov top-level domains (TLDs).

Source: http://www.securityweek.com/phishers-leverage-gov-domain-loophole-bypass-email-validation

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:23:49