{"id":90912,"date":"2019-06-29T10:22:06","date_gmt":"2019-06-29T14:22:06","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-07-30T10:10:28","modified_gmt":"2021-07-30T14:10:28","slug":"most-presidential-wannabes-dont-use-basic-email-security","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/most-presidential-wannabes-dont-use-basic-email-security\/","title":{"rendered":"Presidential Wannabe&#8217;s Don&#8217;t Use Email Security"},"content":{"rendered":"<p><a href=\"https:\/\/www.suffolkgazette.com\/sport\/paul-lambert-big-shoes\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Most Presidential Wannabe's Don't Use Basic Email Security\" src=\"https:\/\/i0.wp.com\/www.suffolkgazette.com\/wp-content\/uploads\/2018\/10\/paul-lambert-big-shoes.jpg?resize=152%2C101&#038;ssl=1\" alt=\"Most Presidential Wannabe's Don't Use Basic Email Security\" width=\"152\" height=\"101\" \/><\/a>We are in the run-up to the <strong>2020<\/strong> <del>silly<\/del> <strong>U.S. Presidential election<\/strong> season. Not much has changed in the three years after <a href=\"https:\/\/www.theguardian.com\/us-news\/2018\/jul\/13\/russians-hillary-clinton-email-server-trump-indictment\" target=\"_blank\" rel=\"noopener noreferrer\"><del>Trump operatives<\/del><\/a> <a href=\"https:\/\/web.archive.org\/web\/20220110182832\/https:\/\/www.nytimes.com\/2018\/07\/13\/us\/politics\/trump-russia-clinton-emails.html\" target=\"_blank\" rel=\"noopener noreferrer\">Russian hackers<\/a> <a href=\"https:\/\/www.npr.org\/2016\/12\/12\/505261053\/13-times-russian-hacking-came-up-in-the-presidential-campaign\" target=\"_blank\" rel=\"noopener noreferrer\">targeted and breached<\/a> the email accounts of Hillary Clinton\u2019s presidential campaign. Email security firm <a href=\"https:\/\/www.agari.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Agari<\/a> <a href=\"https:\/\/www.agari.com\/election-security-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that nearly all <strong>2020 presidential candidates have learned nothing. <\/strong>They <strong>have not implemented <a href=\"https:\/\/www.techopedia.com\/definition\/29704\/email-security\" target=\"_blank\" rel=\"noopener noreferrer\">email security<\/a>. <\/strong>They are not protected against email attacks, fraud, and data breaches typically run by nation-states.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-94393\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing.png?resize=78%2C67&#038;ssl=1\" alt=\"\" width=\"78\" height=\"67\" \/>During the 2016 presidential campaign, the chairman of Hilary Clinton\u2019s campaign, <a href=\"https:\/\/en.wikipedia.org\/wiki\/John_Podesta\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>John Podesta<\/strong><\/a>, was the victim of a <strong><a href=\"https:\/\/web.archive.org\/web\/20201002134851\/https:\/\/www.verdict.co.uk\/how-to-spot-spear-phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">spear-phishing attack<\/a>. <\/strong>That attack led to the now-infamous <a href=\"https:\/\/www.nbcnews.com\/politics\/justice-department\/exclusive-text-messages-show-stone-friend-discussing-wikileaks-plans-n936371\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>WikiLeaks email<\/strong><\/a> publication. The WikiLeaks release derailed the campaign and influenced the result of the election. Agari\u2019s CMO, <a href=\"https:\/\/www.linkedin.com\/in\/najarian\" target=\"_blank\" rel=\"noopener noreferrer\">Armen Najarian<\/a>, explained the importance of <strong>DMARC email protection<\/strong>;<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>DMARC is more important than ever because if it had been implemented with the correct policy on the domain used to spearphish John Podesta, then he would have never received the targeted email attack from Russian operatives.<\/em><\/p>\n<h3>Which campaign practices email security<\/h3>\n<p><a href=\"https:\/\/unusualkentucky.blogspot.com\/2009\/04\/clown-convention.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-94394\" title=\"Clowns\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/clowns-e1561812453637-150x47.jpg?resize=176%2C55&#038;ssl=1\" alt=\"Clowns\" width=\"176\" height=\"55\" \/><\/a>Data released by the California-based firm found that just one presidential hopeful uses DMARC for email security. <strong>Democratic candidate Elizabeth Warren&#8217;s campaign is the only one that uses DMARC for email security. The Warren campaign has completely secured its campaign against the types of email threats that took down Clinton and harmed<\/strong>\u00a0her campaign staff, potential donors, and the public.<\/p>\n<p>Agari suggested in a blog post that the remaining 11 candidates it checked <strong>do not<\/strong> use DMARC. This includes <strong>Bernie Sanders, Joe Biden<\/strong>, and presidential incumbent <strong>Donald Trump. <\/strong>All do not use DMARC on their campaign domains to <strong>secure their email accounts<\/strong>. The company warned that the candidates risk their campaigns being impersonated in <strong>spam campaigns and <a href=\"https:\/\/www.techradar.com\/news\/phishing-attacks-on-the-rise-in-2018\" target=\"_blank\" rel=\"noopener noreferrer\" data-track-type=\"click\" data-index=\"5\" data-component=\"Inline links\" data-count=\"7\">phishing attacks<\/a><\/strong>.<\/p>\n<p>Agari also analyzed advanced email security controls of the campaigns. They <a href=\"https:\/\/www.agari.com\/news-and-press-releases\/most-2020-presidential-campaigns-unprotected\/\" target=\"_blank\" rel=\"noopener noreferrer\">found<\/a>\u00a0that 10 of 12 have no additional protection beyond <strong>basic security included in Microsoft Office 365 or Google Suite<\/strong>.<\/p>\n<h3>Email alphabet soup<\/h3>\n<p><a href=\"https:\/\/blog.woodpecker.co\/cold-email\/smtp-imap\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-94536\" title=\"DMARC, supplements SMTP\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smtpdmarc-e1561843465541-150x136.png?resize=87%2C79&#038;ssl=1\" alt=\"\" width=\"87\" height=\"79\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smtpdmarc-e1561843465541.png?resize=150%2C136&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smtpdmarc-e1561843465541.png?resize=75%2C68&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/smtpdmarc-e1561843465541.png?w=654&amp;ssl=1 654w\" sizes=\"auto, (max-width: 87px) 100vw, 87px\" \/><\/a>DMARC is not an email authentication protocol. It sits on top of the authentication standards <a href=\"https:\/\/web.archive.org\/web\/20150715175507\/http:\/\/blog.returnpath.com:80\/blog\/matt-moorehead\/how-to-explain-spf-in-plain-english\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>SPF<\/strong><\/a>\u00a0(Sender Policy Framework)\u00a0and\u00a0<strong>DKIM<\/strong> (Domain Keys Identified Mail). With <strong>SPF and DKIM, DMARC supplements <a href=\"https:\/\/www.geeksforgeeks.org\/simple-mail-transfer-protocol-smtp\/\" target=\"_blank\" rel=\"noopener noreferrer\">SMTP<\/a><\/strong>, the basic protocol used to send email, because SMTP does not include any mechanisms for email authentication.<\/p>\n<p>A properly configured DMARC policy can tell a receiving server<strong> whether or not to accept an email from a particular sender<\/strong>. DMARC records are published alongside DNS records, including:<\/p>\n<ul>\n<li>SPF<a href=\"https:\/\/blog.woodpecker.co\/cold-email\/spf-dkim\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-94533\" title=\"email security\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/dkimspf-e1561843343259-150x74.png?resize=120%2C59&#038;ssl=1\" alt=\"email security\" width=\"120\" height=\"59\" \/><\/a><\/li>\n<li>A-record<\/li>\n<li>CNAME<\/li>\n<li>DKIM<\/li>\n<\/ul>\n<p><em>Matt Moorehead at <a href=\"https:\/\/www.returnpath.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Return Path<\/a> <\/em><a href=\"https:\/\/web.archive.org\/web\/20191214040012\/https:\/\/blog.returnpath.com\/how-to-explain-dmarc-in-plain-english\/\" target=\"_blank\" rel=\"noopener noreferrer\">explains<\/a> t<em>hat <\/em><a href=\"https:\/\/web.archive.org\/web\/20150615033156\/http:\/\/blog.returnpath.com:80\/blog\/liz-dennison\/infographic:-how-to-prevent-email-fraud-with-dmarc\" target=\"_blank\" rel=\"noopener noreferrer\">DMARC<\/a> is the latest advance in email authentication. <strong>DMARC ensures that legitimate email properly authenticates against established <a href=\"https:\/\/web.archive.org\/web\/20150715175507\/http:\/\/blog.returnpath.com:80\/blog\/matt-moorehead\/how-to-explain-spf-in-plain-english\" target=\"_blank\" rel=\"noopener noreferrer\">SPF<\/a> and DKIM standards<\/strong> and that fraudulent activity appearing from domains under the organization\u2019s control is blocked. Two key values of DMARC are domain alignment and reporting.<\/p>\n<p>DMARC\u2019s alignment feature <strong>prevents spoofing of the email<\/strong> \u201cheader from\u201d address. To pass DMARC, a message must pass SPF authentication and SPF alignment and\/or DKIM authentication and DKIM alignment. A message will fail DMARC if the message fails both (1) SPF or SPF alignment and (2) DKIM or DKIM alignment.<\/p>\n<h3><em><strong><a href=\"https:\/\/web.archive.org\/web\/20210118073839\/https:\/\/www.darkreading.com\/application-security\/leaderboard-shows-adoption-of-dmarc-email-security-protocol\/d\/d-id\/1333311\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"DMARC flow\" src=\"https:\/\/i0.wp.com\/img.deusm.com\/darkreading\/1333311_Image_1.png?resize=480%2C159&#038;ssl=1\" alt=\"DMARC flow\" width=\"480\" height=\"159\" \/><\/a>rb-<\/strong><\/em><\/h3>\n<p><em>Using email authentication to prove that an email comes from the person it says it is is important because nearly <a href=\"https:\/\/web.archive.org\/web\/20220808134344\/https:\/\/www.agari.com\/email-fraud\/ebooks\/q2-2019-report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">30% of advanced email attacks<\/a> (PDF) come from hijacked accounts. Without email, authentication accounts are vulnerable to email security-initiated breaches &#8211; attacks typically run by nation-states. The 2018 <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon DBIR<\/a> found that nation-state groups accounted for at least 23% of the attacks in successful breaches by an outsider.<\/em><\/p>\n<p><em>DMARC is a widely deployed technology that can make the \u201cheader from\u201d address (what users see in their email clients) trustworthy. DMARC helps protect customers and brands; it discourages cybercriminals, who are less likely to target a brand with a DMARC record.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.fastcompany.com\/90346497\/how-to-fight-2020-election-hacking-heres-what-cybersecurity-experts-say\" target=\"_blank\" rel=\"noopener noreferrer\">How to fight 2020 election hacking: Here\u2019s what cybersecurity experts say<\/a> (<a href=\"https:\/\/www.fastcompany.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fast Company<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most 2020 POTUS wannabes are not using email security to protect from Russian phishing attacks that took down the 2016 Clinton election campaign<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3161,1165,2802,3299,3294,3293,2795,3296,171,454,612,1780,4,3297,95,3295],"class_list":["post-90912","post","type-post","status-publish","format-standard","hentry","category-security","tag-3161","tag-apt","tag-bernie-sanders","tag-clown","tag-dkim","tag-dmarc","tag-donald-trump","tag-elizabeth-warren","tag-email","tag-joe-biden","tag-phishing","tag-potus","tag-security","tag-smtp","tag-spam","tag-spf"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/90912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=90912"}],"version-history":[{"count":13,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/90912\/revisions"}],"predecessor-version":[{"id":118885,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/90912\/revisions\/118885"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=90912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=90912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=90912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}