Sep. 11th, 2011

thewayne: (Default)
It's a pretty simple attack that doesn't involve impersonating a web site, just an email server. For example, IBM Sweden's email addresses are se.ibm.com. Register the domain name seibm.com, put an email server there that stores all emails sent to seibm.com, forward them to se.ibm.com, and chances are that the participants in the conversation will never notice.

So a simple typo can reveal highly confidential information.

Two researchers set up several domains in this fashion and in six months harvested 20 gig of data.

Including: contracts from OPEC countries on oil sales and production, business reorganizations, router configuration and passwords, all sorts of wonderful stuff!

The easiest solution is, for example, for IBM to not allow se.ibm.com, force all email through ibm.com, and when you buy a domain to buy all related domains (if possible: org, biz, etc.

Another possibility is to use public key encryption which would cause the message exchange to fail because the recipient's public key couldn't be retrieved by your email server, but there were also arguments about how to get around that. And encrypted email is not easy to use and not often used.

http://www.wired.com/threatlevel/2011/09/doppelganger-domains/

September 2025

S M T W T F S
 12345 6
78910111213
14151617181920
21222324252627
282930    

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Sep. 7th, 2025 05:09 pm
Powered by Dreamwidth Studios