February 20, 2019
There are plenty of problems we face in our daily lives, but some of them are more obvious than others. One problem you might not even be aware of is your email – and the threat it poses to your organization’s cybersecurity. In particular, the threat of man-in-the-middle attacks.
That said, it’s important to first define the origin of a problem before you know how to deal with it.
So, let’s use the Five W’s principle and question our man-in-the-middle.
Applications use a password-login pair mechanism that generates a temporary session token. An attacker listens to sensitive traffic to identify the session token and intercepts it.
This type of attack can happen on both an individual and organizational level. When an attacker breaches an email account, he then monitors communication between the two parties, trying to get information sent to their accounts and steal data from users related to the breached account.
Using radio devices, a cybercriminal can monitor and obtain a significant amount of information about users, their transactions, and their accounts.
If the account’s textual information is unencrypted, such as logins and password, it can be read or possibly used for blackmailing the communicating parties.
Cyber Infections are a type of MITM attack in which malicious software is installed into devices to gather information, redirect traffic, or shut down systems. Cyber infections can occur through emails, system extensions, or networks.
An attacker monitors a user’s device to inject malicious packets into data communication channels. The packets could mix up with valid data, appearing to be a part of the communication. Usually, packet injection involves packet sniffing to determine how and when to send packets.
A digital signature identifies you as the message signer and allows the recipient to verify that contents have not been altered from the moment you signed it.
To send and view encrypted email messages, you and the recipient need to share with each other your public key certificates. To enable the encryption of email messages, you need to send a digitally signed document.
Email encryption in Outlook is S/MIME. S/MIME stands for the Secure/Multipurpose Internet Mail Extensions (a standard for public key encryption).
In S/MIME, email messages can be signed or/and encrypted. Messages are encrypted with the public key of the recipient of the message. That ensures that decryption of the message is done only with the recipient’s private key.
Digital signing of the email is also done with the sender’s private key. That ensures the sender’s identification. When the recipient opens the email, the sender’s public key is used to verify the signature. This way, the recipient can be sure the emails really came from this sender.
In order to use S/MIME encryption, one must obtain a certificate from the trust center, also known as certificate authority (CA).
But consider some nuances when using S/MIME encryption:
The fundamental principle of communication is the secrecy of correspondence. It guarantees that the content of sealed letters is never to be revealed. Whether letters are in transit or at rest, they are not supposed to be opened by third parties.
StealthMail delivered a solution that is designed to protect the key principle. It is called the StealthMail Add-In.
The StealthMail email security solution:
To allow communication between two parties with StealthMail, the sender and receiver must have their “passport.”
In the StealthMail Add-In the “passport data” is a multi-stage identification process of each participant. Only when both sides have confirmed their ID’s and, thus, were recognized by the service, they will be able to continue communication.
To read a message, the application installed on the recipient side performs the same operations as when a letter is sent. It is fair to say that to read a message, the application checks the “passport data.” After confirmation of the identities has been completed, the service decrypts the message.
In other words, with the StealthMail email security solution installed on your device, the chance to execute a phishing attack equals zero, i.e. impossible, because you know for sure that the one who writes you is the real sender.
To get more broader technical insights of StealthMail and how the solution can help protect your business email-correspondence, please download datasheet at https://StealthMail.com/en/info.
Link copied to clipboard!