ROPEMAKER Exploit Allows for Changing of Email Post-Delivery

ROPEMAKER Exploit Allows for Changing of Email Post-Delivery

Researchers say a new exploitable attack vector for email, one that could enable the changing of email content content post-delivery, could let attack

Destructive StoneDrill Wiper Malware On The Loose
Leaky S3 Bucket Discloses Details Of Thousands With Security Clearance
ISACA: Cybersecurity skills gap still hurting enterprises

Researchers say a new exploitable attack vector for email, one that could enable the changing of email content content post-delivery, could let attackers bypass security controls and trick victims into clicking through to a malicious site.

Details of the exploit called ROPEMAKER, which stands for Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky, were made public Tuesday.

The exploit, discovered by Francisco Ribeiro, a researcher at the UK-based security firm Mimecast takes advantage of email design functionality, namely by remotely changing CSS (Cascading Style Sheets) in HTML-based emails.

When the victim’s email client connects to remote CSS—something usually done to retrieve the style of an email—an attacker can change that content, either by substituting a benign link for a malicious one, or by changing a word or number in the email.

The attack doesn’t involve changing the actual content of the email, but instead what’s displayed to the end user, the researcher says.

Ribeiro says the exploit doesn’t work on browser-based emails such as Gmail, Outlook Web Access, or iCloud, but warns that both the desktop and mobile versions of Microsoft Outlook, the desktop and mobile versions of Apple Mail, and Mozilla’s Thunderbird could fall victim to ROPEMAKER. The Android mail client did a good job at thwarting the exploit, but the researcher couldn’t definitively say that mail clients on all versions of the mobile operating system were a safe alternative.

According to Ribeiro there are two ways an attacker could exploit ROPEMAKER via remote CSS. An attacker could use something the researcher calls a switch exploit to send remote CSS code to swap out a benign URL with a malicious one. Both URLs are sent in the original email, but an attacker could remotely edit CSS from which the email gets its display “style” to display a link of his choosing.

The second type of exploit, something called a matrix exploit, involves an attacker sending a blob of ASCII text alongside the email, “character-by-character in the form of a matrix of text.” The attacker uses remote CSS to control what the victim sees, picking and choosing which text to sub out.

Ribeiro cautions that this attack method is the more difficult one to prevent, mainly because email-filtering services can’t find or inspect whatever the destination site is because there’s no URL to detect – it’s all ASCII text.

“To do so would require the interpretation of CSS files, which is beyond the scope of current email security systems. This is an area where the rendering software—usually email clients—should do more to protect the user,” Mimecast’s advisory (.PDF) reads.

By disguising malicious links in ASCII text, an attacker could elude security controls and likely have a better chance of a victim clicking through.

Ribeiro claims that researchers at his firm, which specializes in cloud-based email management, haven’t seen ROPEMAKER exploited in the wild yet, but says that doesn’t mean that attackers aren’t using elements of the exploit in other, potentially more targeted, attacks.

It also doesn’t mean that attackers can’t borrow bits and pieces from ROPEMAKER to carry out further, splintered attacks.

The researcher suggests that an attacker could theoretically intercept a legitmate remote CSS call, almost like a man-in-the-middle attack. He warns attackers could also experiment with Scalable Vector Graphics (SVGs), text and links, to tweak what’s displayed to users in emails. Attackers could also use and