Cyber Attack: IMAP-Based Attacks

goay xuan hui
Apr 7, 2021

Background

Before we go into details how IMAP is used for attack, we need to first understand what is IMAP protocol.

IMAP stands for Internet Access Message Protocol, which is an email protocol that deals with retrieving messages from the email server.

Since it only deals with message retrieval, it cannot be used to send email. For that, we will use SMTP.

https://www.socketlabs.com/blog/smtp-or-imap/

Details of the attack

The migration to O365 services has caused attacker to target insecure legacy protocols like IMAP to by-pass multi-factor authentication (MFA).

According to researchers with Proofpoint, a staggering 60 percent of Microsoft Office 365 and G Suite tenants have been targeted with IMAP-based password-spraying attacks and 25 percent of those targeted experienced a full-on breach as a result.

Mitigation

  • Block IMAP protocol for your corporate environment.

References

https://itservices.usc.edu/office365/emailclients/

--

--

goay xuan hui

A food lover, a cyber security enthusiast, a musician and a traveller, so you will see a mix of different contents in my blog. ☺️