Unveiling the Security Risks | EasyDMARC

Unveiling the Security Risks: Google Groups and DMARC Exploit

4 Min Read
Google Groups and DMARC Exploit

In the vast landscape of online communication, mailing lists have been a staple for collaboration and information exchange. Google Groups, an evolution of traditional mailing lists, offers a platform where users can share messages, documents, and discussions. However, as the digital landscape evolves, so do the threats. Let’s delve into the history of mailing lists, the security vulnerabilities associated with Google Groups, and the compelling reasons for organizations to exercise caution when using them.

History of Mailing Lists and Google Groups

Mailing lists have a rich history dating back to the early days of the Internet, providing a structured means for group communication. Over time, Google Groups emerged as a popular platform, integrating email and web-based discussions seamlessly. However, with the conveniences came unforeseen security challenges.

Issues with Legitimate Emails and Mailing Lists

Legitimate emails sent from domains with enforced DMARC policies (p=quarantine or p=reject) were flagged as suspicious or blocked when routed through mailing lists. The enforcement mechanism intended to protect against phishing inadvertently categorized these genuine communications as potential threats.

To mitigate these challenges and ensure the uninterrupted functioning of mailing lists, providers, including Google Groups, implemented a crucial adjustment. When an email from a domain with an enforced DMARC policy reached a mailing list, the provider would rewrite the “From:” address. This rewriting process ensured that the email appeared to come from the mailing list itself, overcoming the DMARC policy constraints imposed by the sender’s domain.

The Security Hole: DMARC Exploitation

Targeting Google Group Addresses

Cybercriminals cleverly used the re-writing process of the “From:” address to their advantage by specifically targeting setups that allowed anyone on the web to contact the group. Exploiting this opening, hackers carried out attacks by deftly manipulating how Google handled the “From:” address, especially when the sender’s domain enforced a DMARC policy of either p=quarantine or p=reject. This sly manipulation allowed them to launch attacks and navigate through the established security measures.

The Exploit Unfolded

  • Acquisition of a New Domain: Hackers acquire a new domain and enforce a DMARC policy of either quarantine or reject.
  • Sending Spoofed Emails: Attackers send emails from their domain to Google Group addresses.
  • Google’s Address Rewriting: Upon receipt, Google rewrites the “From:” address to match the domain of the Google Group recipient.
  • Deceptive Reply-To Address: The Reply-To address reflects the original sender’s domain, i.e., the hacker’s email domain.
  • Authentication Success: SPF and DKIM processes pass successfully for the Google Group address.
  • BIMI Impact: In cases where the targeted domain has Brand Indicators for Message Identification (BIMI) in place, visual indicators are automatically displayed.

In the above example, we did research on our domain by trying out this loophole to show you the outcome.

1. We created a public Google Group address named [email protected]

2. We sent an email from a personal email ([email protected]) to [email protected]

Note: khatchoian.com got an enforced DMARC policy of p=reject

3. Upon email arrival, we saw how Google Groups rewrote the address to one of the Google Group addresses, by additionally adding the Display Name

4. We saw how SPF and DKIM were passed with the Group Google address domain, even though it was sent by another person

5. We saw how BIMI was also showing, even though it was not sent by someone within EasyDMARC

Why Organizations Should Exercise Caution with Google Groups

Public Mailing Lists and Security Implications

Maintaining a public mailing list where anyone can send an email poses inherent security risks. The exploit discussed reveals the potential for malicious actors to manipulate the communication channel, posing threats to organizational security.

Avoiding Critical Email Channels as Google Group Addresses

Organizations are strongly advised to refrain from using critical email channels, such as Sales, Support, Billing, or any other important communication channels as Google Group addresses. This proactive measure mitigates the risk of exploitation and safeguards crucial communication channels from malicious activities.

Conclusion

It’s important for organizations to grasp the background of mailing lists and be aware of the security risks linked to platforms such as Google Groups as they navigate the intricate realm of online communication. Taking careful steps, enforcing strict access controls, and avoiding the exposure of vital email channels can help organizations strengthen their defenses against ever-changing cyber threats.

Technical & Implementation Services, Team Lead
Fighting against cyber threats, armed with a keyboard.

Comments

guest
22 Comments
Inline Feedbacks
View all comments
Anonymous IT Man
Anonymous IT Man
Nov 17, 2023

So basically, those organizations who use Google Groups are the ones who need to do something about this.

I have a question…

(?) If your company is Not using Google Groups, is it possible for an illigitimate 3rd party to sign up a google groups account using your domain without anything stopping them?

(!!!) If they can, this poses a threat to all organizations, not just ones that are actively using Google Groups.

(>) In this case, we would need to preemptively sign up for and then lock down Google Groups.

Mike Hemmes
Mike Hemmes
Nov 17, 2023

This is fascinating and of course very disconcerting. The whole point of DKIM is to authenticate the sender, end-to-end. Google’s method has completely circumvented this mechanism.

It would appear that Microsoft 365 groups do not process emails in this manner – can we confirm that comparison?

Henry
Henry
Nov 17, 2023

Possibly I’m dense, but I don’t see the hole here. If I subscribe to a group to which anyone can post, why would I assume that every posting I read on this group comes from a group administrator? That would be like assuming that every posting on Twitter/X was written by Elon Musk.

Sean
Sean
Nov 17, 2023

What is googles response to this exploit? The problem here is that Google charges each new email account as a new license seat, so Groups is the only cost effective way to create email lists for generic things like sales@ that need to go to many users at once.

Irwin Lazar
Irwin Lazar
Nov 17, 2023

thanks for sharing. What do you see the ideal alternative for group email address distribution lists (e.g. sales, customerservice, etc.?

Snake
Snake
Nov 17, 2023

ok what I am confused about here is why the sender rewriting was required in the first place?
why do legit emails sent to a mailing list get flagged as dangerous if they have a dmarc policy?

The default behaviour of a mailing list is:-

sender emails the list address ([email protected])
this should not fail any tests

the list then sends out the email to all members from the list address.
this also should not fail any tests

the only point that any issue should arise is if the mailing list tried to forward the email to list members form the original senders own address. But lists do not work this way, as this would defeat the point.

Andreas
Andreas
Nov 17, 2023

I wish email clients like Outlook or Gmail would flag email with a different From and Return-Path value. I haven’t found any extensions, experimental features or tools to use. This would solve the phishing problem once and for all. But it would flag all news and sales letters and MS/Google don’t want that.

Mark Nelissen
Mark Nelissen
Nov 17, 2023

Very interesting and useful advice. But it is missing a critical piece to put into practice: what is the alternative to groups for Google Workspace users when needing a generic, multi-recipient mail address like [email protected] ?

Winston
Winston
Nov 17, 2023

Would a Secure Email Gateway like Mimecast prevent this from happening by preforming these checks?

michael grimes
michael grimes
Nov 18, 2023

very well done article. thanks.

Victor
Victor
Nov 23, 2023

Hello, today I tried to reproduce this issue with our test public Google group.
I created group testgroup@v*******n.com.

Then I send email from my foreign email address (@gmail.com) to the group testgroup@v*******n.com.

Member of that public group received message:

from: Viktor
to: testgroup@v*******n.com
date: Nov 23, 2023, 4:04 PM
subject: my test message
mailing list: testgroup@v*******n.com Filter messages from this mailing list
mailed-by: v*******n.com
signed-by: v*******n.com
unsubscribe: Unsubscribe from this mailing list
security: Standard encryption (TLS) Learn more

I dont see that Google changed “From” header.
At the same time, the message is signed by our domain key.
So, maybe Google fixed the issue already?

succees We’re glad you joined EasyDMARC newsletter! Get ready for valuable email security knowledge every week.

succees You’re already subscribed to EasyDMARC newsletter. Continue learning more about email security with us