Email Attack via a Recycled Domain

email icon

A software engineering friend fell victim to an almost-successful attack on his Facebook account. The attacker seemed to have a database of email addresses and user physical locations (i.e. cities, states, small countries). If the email’s domain name wasn’t registered, the attacker constructed a domain registration and directed its email to a mailbox he controls. He can then change the password on any account tied to that email address. To mask the attack further, he connected via a VPN pipe ending in the victim’s general location.

If an email address matches an account on the targeted web site (Facebook, for example), then the attacker can intercept the password reset email sent to the previously-dormant email address. The attacker then resets the password and takes over the account, at least until the account owner detects the unexpected password change. This may take a while on Facebook since it often relies on long-lived authentication tokens instead of re-transmitting the password.

This attack works really well when a site lets users provide a list of their email addresses, and then logs in to the account when any one of them is used (Facebook). That’s how my friend was caught: he had used an email for a few years and then changed to another. He left the old email in place. He let the domain name lapse.

Response

  1. Email Attack via a Recycled Domain - F1TYM1 Avatar

    […] *** This is a Security Bloggers Network syndicated blog from Cryptosmith authored by cryptosmith. Read the original post at: https://cryptosmith.com/2022/07/15/recycled-domain/ […]

    Like

ACSAC Android Apple attacks authentication Bitcoin Boak Calibre certificates CIA properties classified Clinton cloud computing Coursera CPU cracking crypto cybercurrency databases design principles domain names Drupal ebooks elections email encrypted messages evaluations file systems flaws Ft. Meade GUI history iOS iPhone KGB Kindle library malware memory sizes Microsoft mobile security MSSE Multics NSA NSTISSI 4011 OPDS passwords phishing President quantum Quizlet RAM risks secrecy spam SSL stream cipher TCSEC Top Secret training Trump UMN video Wordpress xor