Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis

Abstract
Sending forged emails by taking advantage of domain spoofing is a common technique used by attackers. The lack of appropriate email anti-spoofing schemes or their misconfiguration may lead to successful phishing attacks or spam dissemination. In this paper, we evaluate the extent of the SPF and DMARC deployment in two large-scale campaigns measuring their global adoption rate with a scan of 236 million domains and high-profile domains of 139 countries. We propose a new algorithm for identifying defensively registered domains and enumerating the domains with misconfigured SPF rules by emulating the SPF check_function. We define for the first time new threat models involving subdomain spoofing and present a methodology for preventing domain spoofing, a combination of good practices for managing SPF and DMARC records and analyzing DNS logs. Our measurement results show that a large part of the domains do not correctly configure the SPF and DMARC rules, which enables attackers to successfully deliver forged emails to user inboxes. Finally, we report on remediation and its effects by presenting the results of notifications sent to CSIRTs responsible for affected domains in two separate campaigns.
Funding Information
  • COMAR project
  • SIDN, the.NL Registry
  • AFNIC, the.FR Registry
  • PrevDDoS project
  • IDEX UGA IRS
  • ANR projects: the Grenoble Alpes Cybersecurity Institute CYBER@ALPS (ANR-15-IDEX-02)
  • PERSYVAL-Lab (ANR-11-LABX-0025-01)
  • DiNS (ANR-19-CE25-0009-01)

This publication has 10 references indexed in Scilit: