How email in transit can be intercepted using DNS hijacking

  • 18 January 2016
  • 0 replies
  • 189 views

Userlevel 7
Badge +54
by Elie Bursztein - Google anti-fraud and abuse research team lead - Monday, 18 January 2016. This article looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack.

While our research on the state of email delivery security indicates that this attack is less pervasive than the TLS downgrade attack, it is equally effective at defeating email in-transit encryption. This article explains how this attack works, how it can be mitigated and to what extent it also affects the security of a website.                     http://www.net-security.org/images/articles/smtp-dns-hijacking.png Full Article

0 replies

Be the first to reply!

Reply