Friday, April 18, 2025
HomeHacksNow attackers can Modify Email content- Even after the Email Delivery

Now attackers can Modify Email content- Even after the Email Delivery

Published on

SIEM as a Service

Follow Us on Google News

We do believe Email is like a physical letter once it dropped it cannot be changed,but it is not true anymore here you can see a new technique called ROPEMAKER.

Security Researcher Francisco Ribeiro from Mimecast discovered a new attack pattern Dubbed ROPEMAKER used by attackers to remotely change the content that you see in your email.

ROPEMAKER stands for Remotely Originated Post-delivery Email Manipulation Attacks which allows changing the content of Email after post delivery even if they use S/MIME or PGP for signing.

- Advertisement - Google News

Also read Email Header Analysis – Received Email is Genuine or Spoofed

Ropemaker originates between the intersection of email and web technologies.Web technologies introduced in Email to make it more dynamic which also leads to this attack vector.

As we aware CSS is a markup language to apply styles for a webpage and ROPEMAKER taking complete advantage of this including aspects such as the layout, colors, and fonts.

Two Sorts of ROPEMAKER Assaults

ROPEMAKER acts as long as the email client automatically connects to the remote CSS to retrieve the desired “style” for the email. This is at the core of the ROPEMAKER exploit.

Switch Exploit

Switch code method enables attackers to toggle the display between the good and bad URL’s portions in the Email.

ROPEMAKER
Source : mimecast

Attackers can use this method to launch a cyber attack, let’s consider they could send an Email with two links one with good and bad one. Initially, they show the good link to Bypass the Organization security layers and then they change to the bad link.

Matrix Exploit

The second method is even more sophisticated than Switch Exploit.Francisco Ribeiro says with this method, a comprehensive matrix script embedded sent by the attacker and then he displays whatever he wants by using use remote CSS.

For instance, he can display a blank Email and by simply changing the file he can display the message.

ROPEMAKER
Source : mimecast

The attacker’s goal, in fact, is to avoid the target organization’s security controls and to deliver a malicious email which will be acted on by the targeted person.To download Technical paper presented by Francisco Ribeiro.

Danger with ROPEMAKER weakness

It is evident that it giving remote control for attackers to direct users to malicious websites and to bypass organization security layers.

PGP, S/MIME or DKIM doesn’t control because this cryptology manipulates only the content of the email but with ROPEMAKER there is no change in the content.It is just to decide what to display for recipients.

Defense

Ribeiro suggests to disable HTML version of mail and to use only plain text or you can switch over Webmail clients such as Gmail or outlook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hacktivist Group Becomes More Sophisticated, Targets Critical Infrastructure to Deploy Ransomware

A recent report by Cyble has shed light on the evolving tactics of hacktivist...

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

Kellogg’s Servers Breached, Hackers Steal Sensitive Data

WK Kellogg Co., one of the world's leading cereal and snack manufacturers, has fallen...