Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:30 AM
E.J. Whaley
E.J. Whaley
Connect Directly
E-Mail vvv

White House Email Security Faux Pas?

The Executive Office of the President isn't complying with the DMARC protocol, but that has fewer implications than some headlines would suggest.

This year, US agencies rushed to implement Domain-based Message, Authentication, Reporting and Conformance (DMARC) protocols by a deadline mandated by the Department of Homeland Security. So, when the Global Cyber Alliance published research that 18 email domains managed by the Executive Office of the President were not using DMARC after that deadline had passed, the reaction was to lament the slow-moving agencies and criticize them for leaving their employees vulnerable to phishing attacks.

However, the fact that the federal government hasn't been implementing DMARC as it should be has far fewer implications for data privacy and the overall national security of the United States than the report and ensuing headlines would let on —  although that doesn't mean securing email shouldn't be taken seriously.

It's important to first understand DMARC's functionality within email security. Simply put, DMARC checks for alignment between the apparent sender of a message and its DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) headers, and then provides instructions to recipients on handling messages that display misalignment. This presupposes that recipients are checking DMARC records, and that senders are providing accurate information to check against. Although proper implementation and enforcement of DMARC can be helpful for preventing phishing attacks where your organization's brand is impersonated to consumers and business partners, it does very little to protect against inbound spear-phishing attacks.

The reason is largely due to what DMARC was designed to accomplish. DMARC effectively serves as a means for the recipient to verify that the sender is who they purport to be. But other than protecting one's own brand against such impersonation, the purported sending organization (in this case, the federal government) is not much further protected from phishing and social engineering attacks intended to steal credentials, personally identifiable information, or other information. There are many highly accessible avenues for these threat actors interested in targeting the government.

For example, many attacks do not impersonate someone at the target's organization with their exact email address. Spoofing attacks may instead employ subtle tricks that go unnoticed by an overworked government employee—whether by using a domain similar to a trusted vendor or partner or impersonating a citizen. Just think about the sheer number of people these organizations interact with and how many "I am Jane Q, please review my document to see how you can help me with my pet project" emails they receive on a daily basis.

This is not to entirely write off DMARC. But although it is true that it would be significantly more difficult for phishers to effectively spoof a domain if every organization implemented DMARC, that goal is not attainable in the short-term, nor would it completely safeguard email users.

Even in a world where proper DMARC implementation is scoped to only the federal agencies in question, the organizations would still be exposed to attacks impersonating potentially any organization that has not implemented DMARC and could even potentially still have exposure to attacks impersonating organizations that do have DMARC implemented. This also says nothing of attacks originating from Gmail, Yahoo, and other email service providers, as well as mail being sent from various other domains. DMARC is only as strong as the sum of its parts, and some of those parts are entirely outside of the purview of the federal government.

This is important as it relates to DMARC and organizations the federal government works with, because it's no secret that external partners have been a major source of data leaks from the government. This means that sensitive government information is only as secure as the security practices used by federal IT contractors. A recent study showed that 49 of the top 50 government IT contractors are also not using DMARC, which puts the government at risk for responding to emails purportedly from those contractors.

The disproportionate focus on DMARC camouflages the fact that there are other core risk factors the government should be addressing if they're serious about improving their email security. In fact, the sophisticated spoofing attacks DMARC is intended to stop represent a relatively small percentage of overall phishing attacks that rely on other, simpler (yet equally effective), vectors. 

Instead, every SMTP communication contains a number of data points: correlation of sending domain and return path, reply-to and IP address(es), sender relationship, and a variety of others that are available for analysis. Malicious or suspicious communications can and should be identified by these types of factors rather than relying entirely on the enforcement of DMARC.

The federal government is similar to many enterprises in that it faces challenges in both expertise and resources. The average business receives approximately 3,680 emails with threat characteristics per week – most of which are unaffected by DMARC protocols. In addition to DMARC, government agencies need to implement automated policies that reduce the organization's reliance on their employees having to proactively identify phishing techniques.

It's not surprising agencies are operating slowly to adopt new standards, but it is encouraging to see the government make email security a priority as it is the most prevalent, and arguably most effective, tool within the arsenal of cybercriminals. While the implementation of DMARC is important, its immediate implementation does little to either increase or decrease the government's susceptibility to cyber espionage. 

Related Content:

Why Cybercriminals Attack: A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go here for more information on this free event.

E.J. Whaley is a Solutions Engineer at GreatHorn. In his current role, he advises CISOs and other information security professionals on their email security strategy and architecture, particularly as they migrate to cloud-based email environments. Drawing on this experience, ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
6/24/2018 | 10:48:58 PM
Fed InfoSec
@EJ: Thanks for this sobering bit of temperance.

Of course, regardless of DMARC's importance, it's worth noting that the federal government has quite a poor track record indeed -- across multiple administrations on both sides of the aisle -- on keeping InfoSec and other IT solutions up to date (even where their own deadlines are concerned).
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-07
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Reports-Devices.php page st[] parameter.
PUBLISHED: 2020-07-07
"HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame."
PUBLISHED: 2020-07-07
"HCL AppScan Enterprise is susceptible to Cross-Site Scripting while importing a specially crafted test policy."
PUBLISHED: 2020-07-07
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Linked.php dv parameter.
PUBLISHED: 2020-07-07
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. Cameralyzer allows attackers to write files to the SD card. The Samsung ID is SVE-2020-16830 (July 2020).