S/MIME and OpenPGP email Hacked

WebstationHQ just came across a very cool article with detailed instructions on how to leverage a very simple attack vector to hack many email clients.  We are sharing this to help others understand the vector to avoid becoming victims to this style of attack.

Using the scenario outlined in the article, the attacker is able to accumulate encrypted emails and store these emails for some time before starting an attack.  The only constraint seems to be that the email account is still active and the operator of it uses one of the email clients that have failed to protect cyphertext. 

To decrypt one of the emails, he or she manipulates cyphertext using malleability gadgets. Social engineering (K. Mitnick et al) is used to understand basic environmental factors of the target’s email client, O/S, encryption software etc. The attacker then transmits the manipulated email to either the original sender or anyone on the CC list.  The email uses new headers and the manipulated cyphertext is hidden within an invisible iFrame. The email can basically be transmitted in such a way as to avoid it appearing suspicious.  Once the receiver opens the email in his client, the manipulated ciphertext will be decrypted. First, the private key of the victim is used to decrypt the session key, and then this session key is used to decrypt the manipulated cyphertext. The decrypted plaintext is then sent to the attacker by using an exfiltration channel (hyperlink, events to trigger it). 

The obvious defense is to use only plain text to render your emails or use one of the email clients that did not succumb to this method.

Article: https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-poddebniak.pdf

Leave a Reply

Your email address will not be published. Required fields are marked *