[sysreq #18068] Fwd: Vulnerability Report: (Email Spoofing)

Passing along this weird email.



-------- Forwarded Message --------
Subject:  Re: Vulnerability Report: (Email Spoofing)
Resent-Date:  Mon, 02 Dec 2024 08:14:03 +0000
Resent-From:  membership@w3.org
Date:  Mon, 2 Dec 2024 13:11:36 +0500
From:  Jed Rip <jed.rip.protector@gmail.com>
To:  membership@w3.org, invoicing@w3.org, w3t-pr@w3.org, 
team-liaisons@w3.org, public-website-redesign@w3.org, sysreq@w3.org, 
contact@w3.org



Hello,

How are you?

I haven't received any update from you yet.
I am eagerly waiting for your reply.
Could you please confirm with me about the reported vulnerability and 
its bounty reward?

Looking forward to hearing from you soon.

Thanks and Regards,

On Sun, Oct 6, 2024 at 7:20 AM Jed Rip <jed.rip.protector@gmail.com> wrote:

    Hello Team,


    I am a security researcher and I provide information and knowledge
    regarding “Vulnerability" on websites. I have found some
    vulnerabilities on your website/domain.

    *DESCRIPTION:*

    *
    *I just sent a forged email to my email addressthat appears to
    originate from membership@w3.org <mailto:membership@w3.org>I was
    able to do this because of the following:

    DMARC record lookup and validation forw3.org <http://w3.org>

      “No DMARC Record found”
    And/ OR
    "DMARC Quarantine/Reject policy not enabled"

    *Fix:
    *1) Publish DMARC Record.  (If not already Published)
    2)Enable DMARC Quarantine/Reject policy
    3)Your DMARC record should look like
    "v=DMARC1; p=reject; sp=none; pct=100; ri=86400;
    rua=mailto:info@domain.com <mailto:info@domain.com>"

    *And*

    As I have seen the SPF and TXT record for the w3.org
    <http://w3.org>  which is :


    Found v=spf1 record for w3.org <http://w3.org>:
    v=spf1 include:_spf.google.com <http://spf.google.com/> ~all


    so valid record will look like :


    Found v=spf1 record for w3.org <http://w3.org>:

    v=spf1 include:_spf.google.com <http://spf.google.com/> -all

    *What's the issue :
    *
    What’s the issue: as u can see in the article difference between
    softfail and hardfail you should be using fail as Hardfail as it
    doesn’t allow anyone to send spoofed emails from your domains, In
    current SPF record you should replace (?) or

    (~) with (-) at last before all , - is strict which prevents all
    spoofed emails except if you are sending

    You can validate by testing yourself over here: mxtoolbox.com
    <http://mxtoolbox.com/>

    This is useful in phishing, and this type of vulnerability is
    newsworthy
    (http://bits.blogs.nytimes.com/2015/04/09/sendgrid-email-breach-was-used-to-attack-coinbase-a-bitcoin-exchange/
    <http://bits.blogs.nytimes.com/2015/04/09/sendgrid-email-breach-was-used-to-attack-coinbase-a-bitcoin-exchange/>

    https://medium.com/@hotbit/official-statement-notices-of-counterfeit-email-listing-hotbit-io-d1d240005d35
    <https://medium.com/@hotbit/official-statement-notices-of-counterfeit-email-listing-hotbit-io-d1d240005d35>

    This can be done using any php mailer tool like this ,

    <?php
    $to = "VICTIM@example.com <mailto:VICTIM@example.com>";
    $subject = "Password Change";
    $txt = "Change your password by visiting here - [VIRUS LINK HERE]l";
    $headers = "From: membership@w3.org <mailto:membership@w3.org>";
    mail($to,$subject,$txt,$headers);
    ?>

    *IMPACT:*
    Due to this vulnerability, any hacker can send a forged email to
    your customers using your domain .Thus, getting sensitive
    information of your customers like login details, downloading a
    virus/malware etc.

    Also When an attacker sends an email to your customers asking them
    to change their password. The customer, after seeing the mail, might
    consider the mail as legit and falls for the trap.

    In doing this the attacker can take them to his website where
    certain JavaScript is executed which steals the customer's session
    id and password.

    The results can be more dangerous and impactful.

    A study shows why DMARC and SPF are crucial:

      1) $1.6 million on average is what one single spear phishing
    attack costs for organizations
      2) $500 million every year is scammed by phishing attacks
      3) Just 3% of all users will report phishing emails to their
    management
      4) More than 400 businesses are targeted by BEC scams every day
      5) 76% of organizations have reported that they have been victims
    of a phishing attack.
      6) 1 in 3 companies have been victims of CEO fraud emails
      7) 70% of all global emails is malicious
      8) Fake invoice messages are the #1 type of phishing lure

    You can find the SPF fix over here :
    https://www.digitalocean.com/community/tutorials/how-to-use-an-spf-record-to-prevent-spoofing-improve-e-mail-reliability
    <https://www.digitalocean.com/community/tutorials/how-to-use-an-spf-record-to-prevent-spoofing-improve-e-mail-reliability>


    For DMARC record :https://easydmarc.com/blog/how-to-fix-no-
    <https://easydmarc.com/blog/how-to-fix-no->dmarc-record-found/

    and DMARC policy here:
    https://support.rackspace.com/how-to/create-a-
    <https://support.rackspace.com/how-to/create-a->dmarc-policy/

    Let me know if you need me to send a forged email.

    *Note:*Eagerly awaiting your approval for the bounty reward tied to
    my recent security contribution. Let's continue the journey
    togetherand will be reporting other vulnerabilities accordingly.


    Stay Safe & Healthy.

    Jed Rip

    *Snapshots:*

    image.png
    image.png

Received on Monday, 2 December 2024 15:49:51 UTC