Vulnerabilities / Threats
11/30/2011
06:59 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Major Email Providers Set Phish Trap

Agari's Email Trust Fabric finds fans at AOL, Google, Microsoft, and Yahoo. The goal: Stop spoofing of legitimate email domains.

What do AOL, Google, Microsoft, and Yahoo have in common, apart from the letter "o"? Among several possible answers, spam is certainly one. The billion email inboxes managed by the four companies get far too much spam, including plenty of phishing attacks.

In an effort to find a solution to their common problem, the four companies have been working with a startup called Agari to implement the Agari Email Trust Fabric, a email authentication layer that limits the effectiveness of phishing.

Agari's system can't stop phishing entirely because it's a social engineering attack: Phishing works by duping the recipient of a phishing message into clicking on a malicious link that appears to be legitimate. But the company claims it can eliminate a particularly effective attack vector: The misuse of trusted email domains.

The Agari Email Trust Fabric prevents malicious email senders from spoofing legitimate email domains within its set of protected mailboxes. It does this through a cloud service built using SPF and DKIM, two established domain authentication technologies.

[ 2011 was a big year for Google. Find out more in Google's Daring Dozen: 12 Big Bets In 2011. ]

Citing an RSA study, Patrick Peterson, CEO of Agari, said in a phone interview that phishing costs companies $1 billion annually.

Financial services companies, in particular, suffer from phishing, both in terms of fraud losses and diminished customer trust. But perhaps not much longer: With Agari's technology, Peterson said that some large clients are seeing 50 million phishing messages blocked per day.

"That is a massive win for them," he said, noting that Agari's system can stop 100% of phishing messages that rely on spoofing the domains of its customers. That's not every phishing attempt--deceptively misspelled domains that look like legitimate domains, for example, may not be caught--but it's a start.

Peterson says Agari can help companies understand how their online identity is being used and can help them enforce policy controls.

Google product manager Adam Dawes, in a statement, observed that Google has been working with various email authentication standards since 2004. While coordinated authentication between sender and receiver has historically proved to be a challenge, he suggests that Agari's approach can help.

"Agari's approach simplifies the authentication process for large email senders, helps them communicate clear policies to receivers like Gmail, and creates higher communications value for their email transactions," he said.

Agari's system also gathers massive amounts of data for its customers. With the help of analytical tools, customers can see what's going on in their email channel and they can share their findings with authorities or ISPs to help shut down email abuse.

Peterson, however, insists that Agari doesn't see its customers' data, and won't become a magnet for authorities seeking access to email users' data. "We think [our system] draws the line quite nicely between privacy concerns and actually providing some actionable threat intelligence," he said.

The Enterprise Connect conference program covers the full range of platforms, services, and applications that comprise modern communications and collaboration systems. It happens March 25-29 in Orlando, Fla. Find out more.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1291
Published: 2015-09-03
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web s...

CVE-2015-1292
Published: 2015-09-03
The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.

CVE-2015-1293
Published: 2015-09-03
The DOM implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.

CVE-2015-1294
Published: 2015-09-03
Use-after-free vulnerability in the SkMatrix::invertNonIdentity function in core/SkMatrix.cpp in Skia, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering the use of matrix elements that lead to an...

CVE-2015-1295
Published: 2015-09-03
Multiple use-after-free vulnerabilities in the PrintWebViewHelper class in components/printing/renderer/print_web_view_helper.cc in Google Chrome before 45.0.2454.85 allow user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact by triggering nested IPC m...

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.