02 Big Feed-Back-2 http://feed.informer.com/digests/9LXUZXHORB/feeder 02 Big Feed-Back-2 Respective post owners and feed distributors Wed, 21 Mar 2018 17:45:38 -0400 Feed Informer http://feed.informer.com/ User Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement. https://infosecwriteups.com/user-enumeration-techniques-and-tactics-in-an-active-directory-pentesting-engagement-c634bf241017?source=rss----7b722bfd1b8d---4 01 Primary Feed 5 urn:uuid:93e7ca7a-5351-a1ae-66fc-071f6c6aa4a2 Sun, 24 Mar 2024 01:37:31 -0400 <p>Hi! My name is Hashar Mujahid and Today we will learn some techniques and ways by which we can enumerate valid users in an Active Directory Environment.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/960/0*qd4Ci6Mege6TQ0zi.jpg" /></figure><p>There are quite a few ways by which we might be able to extract a list of valid usernames, Let&#39;s discuss them one by one.</p><h3><strong>SMB USERNAME ENUMERATION:</strong></h3><p>Misconfigured SMB shares can give us a lot of information about our target and environment.</p><p>We can use a --users fag in crackmapexec to discover some valid users.</p><pre>crackmapexec smb 192.168.56.11 --users</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*b25qMjCuRoThKJPhWYbN4Q.png" /><figcaption>Crackmapexec Users Enumeration</figcaption></figure><p>Here we can see all the users available on the machine.</p><p>Nmap also provides a script for enumerating users through SMB but it is more like a hit or miss.</p><pre>sudo nmap --script smb-enum-users.nse -p445 &lt;ip&gt;</pre><h3>RPC USER NAME ENUMERATION:</h3><p>After running your port scan if you see msrpc port enabled at 135 and alot of msrpc ports in higher ports like this.</p><pre>Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-06 00:57 EST<br>Nmap scan report for 192.168.56.10<br>Host is up, received user-set (0.00068s latency).<br><br>PORT STATE SERVICE REASON VERSION<br>53/tcp open domain syn-ack Simple DNS Plus<br>80/tcp open http syn-ack Microsoft IIS httpd 10.0<br>|_http-dombased-xss: Couldn&#39;t find any DOM based XSS.<br>|_http-csrf: Couldn&#39;t find any CSRF vulnerabilities.<br>|_http-stored-xss: Couldn&#39;t find any stored XSS vulnerabilities.<br>|_http-server-header: Microsoft-IIS/10.0<br>88/tcp open kerberos-sec syn-ack Microsoft Windows Kerberos (server time: 2024-03-06 05:57:46Z)<br>135/tcp open msrpc syn-ack Microsoft Windows RPC<br>139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn<br>389/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)<br>445/tcp open microsoft-ds? syn-ack<br>464/tcp open kpasswd5? syn-ack<br>593/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0<br>636/tcp open ssl/ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)<br>3268/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)<br>3269/tcp open ssl/ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)<br>3389/tcp open ms-wbt-server syn-ack Microsoft Terminal Services<br>5985/tcp open http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)<br>|_http-csrf: Couldn&#39;t find any CSRF vulnerabilities.<br>|_http-dombased-xss: Couldn&#39;t find any DOM based XSS.<br>|_http-stored-xss: Couldn&#39;t find any stored XSS vulnerabilities.<br>|_http-server-header: Microsoft-HTTPAPI/2.0<br>5986/tcp open ssl/http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)<br>|_http-server-header: Microsoft-HTTPAPI/2.0<br>|_http-csrf: Couldn&#39;t find any CSRF vulnerabilities.<br>|_http-stored-xss: Couldn&#39;t find any stored XSS vulnerabilities.<br>|_http-dombased-xss: Couldn&#39;t find any DOM based XSS.<br>9389/tcp open mc-nmf syn-ack .NET Message Framing<br>47001/tcp open http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)<br>|_http-stored-xss: Couldn&#39;t find any stored XSS vulnerabilities.<br>|_http-server-header: Microsoft-HTTPAPI/2.0<br>|_http-dombased-xss: Couldn&#39;t find any DOM based XSS.<br>|_http-csrf: Couldn&#39;t find any CSRF vulnerabilities.<br>49664/tcp open msrpc syn-ack Microsoft Windows RPC<br>49665/tcp open msrpc syn-ack Microsoft Windows RPC<br>49666/tcp open msrpc syn-ack Microsoft Windows RPC<br>49667/tcp open msrpc syn-ack Microsoft Windows RPC<br>49668/tcp open msrpc syn-ack Microsoft Windows RPC<br>49670/tcp open msrpc syn-ack Microsoft Windows RPC<br>49671/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0<br>49672/tcp open msrpc syn-ack Microsoft Windows RPC<br>49674/tcp open msrpc syn-ack Microsoft Windows RPC<br>49677/tcp open msrpc syn-ack Microsoft Windows RPC<br>49684/tcp open msrpc syn-ack Microsoft Windows RPC<br>49704/tcp open msrpc syn-ack Microsoft Windows RPC<br>49712/tcp open msrpc syn-ack Microsoft Windows RPC<br>Service Info: Host: KINGSLANDING; OS: Windows; CPE: cpe:/o:microsoft:windows<br><br>Host script results:<br>|_smb-vuln-ms10-054: false<br>|_smb-vuln-ms10-061: Could not negotiate a connection:SMB: Failed to receive bytes: ERROR<br>|_samba-vuln-cve-2012-1182: Could not negotiate a connection:SMB: Failed to receive bytes: ERROR<br><br>Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .<br>Nmap done: 1 IP address (1 host up) scanned in 357.17 seconds</pre><p>As in the portscan, we can see a lot of msrpc ports. We might we able to authenticate as a guest user or anonymous user and able to enumerate some valid domain users and much more.</p><p>Command to connect to msrpc using RPC client is.</p><pre><br>rpcclient -U &#39;&#39; -N &lt;ip&gt;</pre><p>This will try to authenticate as a null session or guest user. If you see the rpcclient command prompt that means the null sessions are allowed over RPC.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/381/1*MB5dtKGEYT-vi3J2sUMyig.png" /><figcaption>RPC Client</figcaption></figure><p>From here we can use a command.</p><pre>enumdomusers</pre><p>This will list all the domain users in the output.</p><pre>┌──(hax㉿Kali)-[~]<br>└─$ rpcclient -U &#39;&#39; -N 192.168.56.11<br>rpcclient $&gt; enumdomusers<br>user:[Guest] rid:[0x1f5]<br>user:[arya.stark] rid:[0x456]<br>user:[sansa.stark] rid:[0x45a]<br>user:[brandon.stark] rid:[0x45b]<br>user:[rickon.stark] rid:[0x45c]<br>user:[hodor] rid:[0x45d]<br>user:[jon.snow] rid:[0x45e]<br>user:[samwell.tarly] rid:[0x45f]<br>user:[jeor.mormont] rid:[0x460]<br>user:[sql_svc] rid:[0x461]<br>rpcclient $&gt;</pre><p>Moreover, we can also enumerate domain groups by using a command.</p><pre>enumdomgroups</pre><p>this will grab us all the domain groups.</p><pre>rpcclient $&gt; enumdomgroups<br>group:[Domain Users] rid:[0x201]<br>group:[Domain Guests] rid:[0x202]<br>group:[Domain Computers] rid:[0x203]<br>group:[Group Policy Creator Owners] rid:[0x208]<br>group:[Cloneable Domain Controllers] rid:[0x20a]<br>group:[Protected Users] rid:[0x20d]<br>group:[Key Admins] rid:[0x20e]<br>group:[DnsUpdateProxy] rid:[0x44f]<br>group:[Stark] rid:[0x452]<br>group:[Night Watch] rid:[0x453]<br>group:[Mormont] rid:[0x454]</pre><p>We can gather a lot of information from RPC but this blog only focuses on obtaining the Username information. Just for example here we enumerate trusts and privileges.</p><pre>rpcclient $&gt; enumtrust<br>SEVENKINGDOMS S-1-5-21-2175085339-1005593252-1533393449<br>rpcclient $&gt; enumprivs<br>found 35 privileges<br><br>SeCreateTokenPrivilege 0:2 (0x0:0x2)<br>SeAssignPrimaryTokenPrivilege 0:3 (0x0:0x3)<br>SeLockMemoryPrivilege 0:4 (0x0:0x4)<br>SeIncreaseQuotaPrivilege 0:5 (0x0:0x5)<br>SeMachineAccountPrivilege 0:6 (0x0:0x6)<br>SeTcbPrivilege 0:7 (0x0:0x7)<br>SeSecurityPrivilege 0:8 (0x0:0x8)<br>SeTakeOwnershipPrivilege 0:9 (0x0:0x9)<br>SeLoadDriverPrivilege 0:10 (0x0:0xa)<br>SeSystemProfilePrivilege 0:11 (0x0:0xb)<br>SeSystemtimePrivilege 0:12 (0x0:0xc)<br>SeProfileSingleProcessPrivilege 0:13 (0x0:0xd)<br>SeIncreaseBasePriorityPrivilege 0:14 (0x0:0xe)<br>SeCreatePagefilePrivilege 0:15 (0x0:0xf)<br>SeCreatePermanentPrivilege 0:16 (0x0:0x10)<br>SeBackupPrivilege 0:17 (0x0:0x11)<br>SeRestorePrivilege 0:18 (0x0:0x12)<br>SeShutdownPrivilege 0:19 (0x0:0x13)<br>SeDebugPrivilege 0:20 (0x0:0x14)<br>SeAuditPrivilege 0:21 (0x0:0x15)<br>SeSystemEnvironmentPrivilege 0:22 (0x0:0x16)<br>SeChangeNotifyPrivilege 0:23 (0x0:0x17)<br>SeRemoteShutdownPrivilege 0:24 (0x0:0x18)<br>SeUndockPrivilege 0:25 (0x0:0x19)<br>SeSyncAgentPrivilege 0:26 (0x0:0x1a)<br>SeEnableDelegationPrivilege 0:27 (0x0:0x1b)<br>SeManageVolumePrivilege 0:28 (0x0:0x1c)<br>SeImpersonatePrivilege 0:29 (0x0:0x1d)<br>SeCreateGlobalPrivilege 0:30 (0x0:0x1e)<br>SeTrustedCredManAccessPrivilege 0:31 (0x0:0x1f)<br>SeRelabelPrivilege 0:32 (0x0:0x20)<br>SeIncreaseWorkingSetPrivilege 0:33 (0x0:0x21)<br>SeTimeZonePrivilege 0:34 (0x0:0x22)<br>SeCreateSymbolicLinkPrivilege 0:35 (0x0:0x23)<br>SeDelegateSessionUserImpersonatePrivilege 0:36 (0x0:0x24)</pre><p>Furthermore, you can also make use of the net tool to enumerate users as well. It is better to have multiple tools under your belt in case one stops working.</p><pre>┌──(hax㉿Kali)-[~]<br>└─$ net rpc group members &#39;Domain Users&#39; -W &#39;NORTH&#39; -I &#39;192.168.56.11&#39; -U &#39;%&#39;<br>NORTH\Administrator<br>NORTH\vagrant<br>NORTH\krbtgt<br>NORTH\SEVENKINGDOMS$<br>NORTH\arya.stark<br>NORTH\eddard.stark<br>NORTH\catelyn.stark<br>NORTH\robb.stark<br>NORTH\sansa.stark<br>NORTH\brandon.stark<br>NORTH\rickon.stark<br>NORTH\hodor<br>NORTH\jon.snow<br>NORTH\samwell.tarly<br>NORTH\jeor.mormont<br>NORTH\sql_svc</pre><h3>Enumerating Users Kerbrute.</h3><p>If kerberose is enabled then you can probably enumerate usernames by using a tool called Kerbrute.</p><p>Kerbrute is a tool that can enumerate valid usernames by performing a technique called Kerberos pre-authentication. Kerbrute can also brute force users, enumerate users and perform attacks like password spraying.</p><p><a href="https://github.com/ropnop/kerbrute">GitHub - ropnop/kerbrute: A tool to perform Kerberos pre-auth bruteforcing</a></p><p>We can use this tool with a username list and it will go through each user and see if it gets a response back from the domain controller.</p><p>Command:</p><pre>kerbrute userenum --dc &lt;ip&gt; -d test.local /usr/share/wordlists/seclists/Usernames/Names/names.txt</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/910/1*3cPFKJHODtwypkY6vs6mVQ.png" /></figure><p>You can add a -t &lt;number&gt; flag to control the number of threads.</p><p>The same process can be done through Nmap.</p><p>Command:</p><pre>nmap -p 88 --script=krb5-enum-users --script-args=&quot;krb5-enum-users.realm=&#39;&lt;domain&#39;,userdb=&lt;users_list_file&gt;&quot; $ip</pre><p>This will also make use of the kerberose pre-authentication to enumerate valid users</p><p>Some username lists that can be used are given below.</p><ul><li><a href="https://github.com/insidetrust/statistically-likely-usernames">GitHub - insidetrust/statistically-likely-usernames: Wordlists for creating statistically likely username lists for use in password attacks and security testing</a></li><li><a href="https://github.com/danielmiessler/SecLists/tree/master/Usernames">SecLists/Usernames at master · danielmiessler/SecLists</a></li><li><a href="https://github.com/attackdebris/kerberos_enum_userlists">GitHub - attackdebris/kerberos_enum_userlists: Collection of username lists for enumerating kerberos domain users</a></li></ul><p>This list can be beneficial for obtaining valid usernames from the active directory.</p><p>If you like this blog and would like to see more Pentesting Content Consider giving a Follow <a href="https://www.linkedin.com/in/hashar-mujahid-7223181a3/">LinkedIn</a> , <a href="https://twitter.com/Mujahid_Hashar">X</a>.</p><p>See you next time.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fgiphy.com%2Fembed%2FGLEppek0U6LFA37je3%2Ftwitter%2Fiframe&amp;display_name=Giphy&amp;url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2FGLEppek0U6LFA37je3%2Fgiphy.gif%3Fcid%3D790b7611ckag6ttabajv19u8as026e9ku5xt3islzbcyip22%26ep%3Dv1_gifs_search%26rid%3Dgiphy.gif%26ct%3Dg&amp;image=https%3A%2F%2Fmedia4.giphy.com%2Fmedia%2Fv1.Y2lkPTc5MGI3NjExbGZrY2M4aWxranFqNWk0djlraDl1a2xwZzdncHdhdzRyaWFmd2VtNCZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw%2FGLEppek0U6LFA37je3%2Fgiphy.gif&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=giphy" width="435" height="244" frameborder="0" scrolling="no"><a href="https://medium.com/media/d16721bc62fc24664839df44ab265d99/href">https://medium.com/media/d16721bc62fc24664839df44ab265d99/href</a></iframe><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c634bf241017" width="1" height="1" alt=""><hr><p><a href="https://infosecwriteups.com/user-enumeration-techniques-and-tactics-in-an-active-directory-pentesting-engagement-c634bf241017">User Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement.</a> was originally published in <a href="https://infosecwriteups.com">InfoSec Write-ups</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p> penetration-testing pentesting ethical-hacking active-directory cybersecurity Hashar Mujahid Launching email security insights on Cloudflare Radar https://blog.cloudflare.com/email-security-insights-on-cloudflare-radar 01 Primary Feed 4 urn:uuid:4913e73e-3d9a-a4d4-4b06-bacbf2c21a9c Tue, 20 Feb 2024 14:41:34 -0500 The new Email Security section on Cloudflare Radar provides insights into the latest trends around threats found in malicious email, sources of spam and malicious email, and the adoption of technologies designed to prevent abuse of email <figure><img src="http://blog.cloudflare.com/content/images/2024/03/image2-28.png" /></figure><p>During 2021's Birthday Week, we <a>announced</a> our <a>Email Routing</a> service, which allows users to direct different types of email messages (such as marketing, transactional, or administrative) to separate accounts based on criteria such as the recipient’s address or department. Its capabilities and the volume of messages routed have <a>grown significantly</a> since launch. </p><p>Just a few months later, on February 23, 2022, we announced our intent to acquire Area 1 Security to protect users from phishing attacks in email, web, and network environments. Since the completion of the acquisition on April 1, 2022, Area 1's email security capabilities have been integrated into Cloudflare's <a>secure access service edge (SASE)</a> solution portfolio, and now processes tens of millions of messages daily.</p><p>Processing millions of email messages each day on behalf of our customers gives us a unique perspective on the threats posed by malicious emails, spam volume, the adoption of <a>email authentication methods like SPF, DMARC, and DKIM</a>, and the use of IPv4/IPv6 and TLS by email servers. Today, we are launching a new <a>Email Security section</a> on <a>Cloudflare Radar</a> to share these perspectives with you. The insights in this new section can help you better understand the state of email security as viewed across various metrics, as well as understanding real-time trends in email-borne threats. (For instance, correlating an observed increase within your organization in messages containing malicious links with a similar increase observed by Cloudflare.) Below, we review the new metrics that are now available on Radar.</p><h3>Tracking malicious email</h3><p>As Cloudflare’s <a>email security</a> service processes email messages on behalf of customers, we are able to identify and classify offending messages as malicious. As examples, malicious emails may attempt to trick recipients into sharing personal information like login details, or the messages could attempt to spread malware through embedded images, links, or attachments. The new Email Security section on Cloudflare Radar now <a>provides insight</a> at a global level into the aggregate share of processed messages that we have classified as malicious over the selected timeframe. During <a>February 2024</a>, as shown in the figure below, we found that an average of 2.1% of messages were classified as being malicious. Spikes in malicious email volume were seen on February 10 and 11, accounting for as much as 29% of messages. These spikes occurred just ahead of the Super Bowl, in line with <a>previous observations</a> of increases in malicious email volume in the week ahead of the game. Other notable (but lower) spikes were seen on February 13, 15, 17, 24, and 25. The <a>summary</a> and <a>time series </a>data for malicious email share are available through the Radar API.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/pasted-image-0-6.png" /></figure><h3>Threat categorization</h3><p>The <a>Cloudflare Radar 2023 Year in Review</a> highlighted some of the techniques used by attackers when carrying out attacks using malicious email messages. As noted above, these can include links or attachments leading to malware, as well as approaches like identity deception, where the message appears to be coming from a trusted contact, and brand impersonation, where the message appears to be coming from a trusted brand. In analyzing malicious email messages, Cloudflare’s email security service categorizes the threats that it finds these messages contain. (Note that a single message can contain multiple types of threats — the sender could be impersonating a trusted contact while the body of the email contains a link leading to a fake login page.)</p><p>Based on these assessments, Cloudflare Radar now <a>provides insights</a> into trends observed across several different groups of threat types including “Attachment”, “Link”, “Impersonation”, and “Other”. “Attachment” groups individual threat types where the attacker has attached a file to the email message, “Link” groups individual threat types where the attacker is trying to get the user to click on something, and “Impersonation” groups individual threat types where the attacker is impersonating a trusted brand or contact. The “Other” grouping includes other threat types not covered by the previous three.</p><p>During February 2024 for the “Link” grouping, as the figure below illustrates, link-based threats were unsurprisingly the most common, and were found in 58% of malicious emails. Since the display text for a link (i.e., hypertext) in HTML can be arbitrarily set, attackers can make a URL appear as if it links to a benign site when, in fact, it is actually malicious. Nearly a third of malicious emails linked to something designed to harvest user credentials. The <a>summary</a> and <a>time series</a> data for these threat categories are available through the Radar API.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/pasted-image-0--1--3.png" /></figure><p>For the “Attachment” grouping, during February 2024, nearly 13% of messages were found to have a malicious attachment that when opened or executed in the context of an attack, includes a call-to-action (e.g. lures target to click a link) or performs a series of actions set by an attacker. The share spiked several times throughout the month, reaching as high as 70%. The attachments in nearly 6% of messages attempted to download additional software (presumably malware) once opened.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/pasted-image-0--2--2.png" /></figure><p>If an email message appears to be coming from a trusted brand, users may be more likely to open it and take action, like checking the shipping status of a package or reviewing a financial transaction. During February 2024, on average, over a quarter of malicious emails were sent by attackers attempting to impersonate well-known brands. Similar to other threat categories, this one also saw a number of significant spikes, reaching as high as 88% of February 17. Just over 18% of messages were found to be trying to extort users in some fashion. It appears that such campaigns were very active in the week ahead of Valentine's Day (February 14), although the peak was seen on February 15, at over 95% of messages.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Impersonation.png" /></figure><p>Identity deception occurs when an attacker or someone with malicious intent sends an email claiming to be someone else, whether through use of a similar-looking domain or display name manipulation. This was the top threat category for the “Other” grouping, seen in over 36% of malicious emails during February 2024. The figure below shows three apparent “waves” of the use of this technique — the first began at the start of the month, the second around February 9, and the third around February 20. Over 11% of messages were categorized as malicious because of the reputation of the network (<a>autonomous system</a>) that they were sent from; some network providers are well-known sources of malicious and unwanted email.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/pasted-image-0--3--1.png" /></figure><h3>Dangerous domains</h3><p><a>Top-level domains, also known as TLDs</a>, are found in the right-most portion of a hostname. For example, <code>radar.cloudflare.com</code> is in the <code>.com</code> <a>generic Top Level Domain (gTLD)</a>, while <code>bbc.co.uk</code> is in the <code>.uk</code> <a>country code Top Level Domain (ccTLD)</a>. As of February 2024, there are nearly 1600 Top Level Domains listed in the <a>IANA Root Zone Database</a>. Over the last 15 years or so, several reports have been published that look at the “most dangerous TLDs” — that is, which TLDs are most favored by threat actors. The “top” TLDs in these reports are often a mix of ccTLDs from smaller counties and <a>newer gTLDs</a>. On Radar, we are now sharing our own perspective on these dangerous TLDs, highlighting those where we have observed the largest shares of malicious and spam emails. The analysis is based on the sending domain’s TLD, found in the <code>From:</code> header of an email message. For example, if a message came from <code>joe@example.com</code>, then <code>example.com</code> is the sending domain, and <code>.com</code> is the associated TLD.</p><p>On Radar, users can view shares of spam and malicious email, and can also filter by timeframe and “type” of TLD, with options to view all (the complete list), ccTLDs (country codes), or “classic” TLDs (the original set of gTLDs specified in <a>RFC 1591</a>). Note that spam percentages shown here may be lower than those published in other industry analyses. Cloudflare cloud email security customers may be performing initial spam filtering before messages arrive at Cloudflare for processing, resulting in a lower percentage of messages characterized as spam by Cloudflare.</p><p>Looking back across February 2024, we found that new gTLD <code>associates</code> and the ccTLD <code>zw</code> (Zimbabwe) were the TLDs with domains originating the largest shares of malicious email, at over 85% each. New TLDs <code>academy</code>, <code>directory</code>, and <code>bar</code> had the largest shares of spam in email sent by associated domains, at upwards of 95%.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/pasted-image-0--4-.png" /><figcaption><em>TLDs with the highest percentage of malicious email in February 2024</em></figcaption></figure><figure><img src="http://blog.cloudflare.com/content/images/2024/03/pasted-image-0--5-.png" /><figcaption><em>TLDs with the highest percentage of spam email in February 2024</em></figcaption></figure><p>The figure below breaks out ccTLDs, where we found that at least half of the messages coming from domains in <code>zw</code> (Zimbabwe, at 85%) and <code>bd</code> (Bangladesh, at 50%) were classified as malicious. While the share of malicious email vastly outweighed the share of spam seen from <code>zw</code> domains, it was much more balanced in <code>bd</code> and <code>pw</code> (Palau). A total of 80 ccTLDs saw fewer than 1% of messages classified as malicious in February 2024.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/pasted-image-0--6-.png" /><figcaption><em>ccTLDs with the highest percentage of malicious email in February 2024</em></figcaption></figure><p>Among the “classic” TLDs, we can see that the shares of both malicious emails and spam are relatively low. Perhaps unsurprisingly, as the largest TLD, <code>com</code> has the largest shares of both in February 2024. Given the restrictions around registering <a><code>int</code></a> and <a><code>gov</code></a> domains, it is interesting to see that even 2% of the messages from associated domains are classified as malicious.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/pasted-image-0--7-.png" /><figcaption><em>Classic TLDs with the highest percentage of malicious email in February 2024.</em></figcaption></figure><p>The reasons that some TLDs are responsible for a greater share of malicious and/or spam email vary — some may have loose or non-existent registration requirements, some may be more friendly to so-called “<a>domain tasting</a>”, and some may have particularly low domain registration fees.The <a>malicious</a> and <a>spam</a> summary shares per TLD are available through the Radar API.</p><h3>Adoption of email authentication methods</h3><p><a>SPF, DKIM, and DMARC</a> are three email <a>authentication</a> methods and when used together, they help prevent spammers, <a>phishers</a>, and other unauthorized parties from sending <a>emails</a> on behalf of a <a>domain</a> they do not own.</p><p>Sender Policy Framework (SPF) is a way for a domain to list all the servers they send emails from, with <a>SPF records</a> in the DNS listing the <a>IP addresses</a> of all the servers that are allowed to send emails from the domain. Mail servers that receive an email message can check it against the SPF record before passing it on to the recipient's inbox. DomainKeys Identified Mail (DKIM) enables domain owners to automatically "sign" emails from their domain with a digital “signature” that uses cryptography to mathematically verify that the email came from the domain. Domain-based Message Authentication Reporting and Conformance (DMARC) tells a receiving email server what to do, given the results after checking SPF and DKIM. A domain's DMARC policy, stored in <a>DMARC records</a>, can be set in a variety of ways, instructing mail servers to quarantine emails that fail SPF or DKIM (or both), to reject such emails, or to deliver them.</p><p>These authentication methods have recently taken on increased importance, as both <a>Google</a> and <a>Yahoo!</a> have announced that during the first quarter of 2024, as part of a more aggressive effort to reduce spam, they will require bulk senders to follow <a>best practices</a> that include implementing stronger email authentication using standards like SPF, DKIM, and DMARC. When a given email message is evaluated against these three methods, the potential outcomes are PASS, FAIL, and NONE. The first two are self-explanatory, while NONE means that there was no associated SPF/DKIM/DMARC policy associated with the message’s sending domain.</p><p>Reviewing the average shares across February 2024, we find that over 93% of messages passed SPF authentication, while just 2.7% failed. When considering this metric, FAIL is the outcome of greater interest because SPF is easier to spoof than DKIM, and also because failure may be driven by “shadow IT” situations, such as when a company’s Marketing department uses a third party to send email on behalf of the company, but fails to add that third party to the associated SPF records. An average of 88.5% of messages passed DKIM evaluation in February, while just 2.1% failed. For DKIM, the focus should be on PASS, as there are potential non-malicious reasons that a given signature may fail to verify. For DMARC, 86.5% of messages passed authentication, while 4.2% failed, and the combination of PASS and FAIL is the focus, as the presence of an associated policy is of greatest interest for this metric, and whether the message passed or failed less so. For all three methods in this section, NONE indicates the lack of an associated policy. SPF (<a>summary</a>, <a>time series</a>), DKIM (<a>summary</a>, <a>time series</a>), and DMARC (<a>summary</a>, <a>time series</a>) data is available through the Radar API.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Screenshot-2024-03-08-at-12.51.49.png" /></figure><h3>Protocol usage</h3><p>Cloudflare has <a>long evangelized IPv6 adoption</a>, although it has largely been focused on making Web resources available via this <a>not-so-new version</a> of the protocol. However, it’s also important that other Internet services begin to support and use IPv6, and this is an area where <a>our recent research</a> shows that providers may be lacking.</p><p>Through analysis of inbound connections from senders’ mail servers to Cloudflare’s email servers, we can gain insight into the distribution of these connections across IPv4 and IPv6. Looking at this distribution for February 2024, we find that 95% of connections were made over IPv4, while only 5% used IPv6. This distribution is in sharp contrast to the share of IPv6 requests for IPv6-capable (dual stacked) Web content, which was 37% <a>for the same time period</a>. The <a>summary</a> and <a>time series</a> data for IPv4/v6 distribution are available through the Radar API.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Screenshot-2024-03-08-at-12.52.26.png" /></figure><p>Cloudflare has also been a long-time advocate for secure connections, launching <a>Universal SSL</a> during 2014’s Birthday Week, to enable secure connections between end users and Cloudflare for all of our customers’ sites (which numbered ~2 million at the time). Over the last 10 years, SSL has completed its evolution to <a>TLS</a>, and although many think of TLS as only being relevant for Web content, possibly due to years of being told to look for the Security Week Cloudflare Radar Email Email Routing Email Security Trends David Belson Cloudflare protects global democracy against threats from emerging technology during the 2024 voting season https://blog.cloudflare.com/protecting-global-democracy-against-threats-from-emerging-technology 01 Primary Feed 4 urn:uuid:2614450b-b726-5296-0012-3a6f7ddafb34 Tue, 20 Feb 2024 14:41:34 -0500 In 2024, more than 80 national elections are slated to occur, directly impacting approximately 4.2 billion individuals. At Cloudflare, we’re ready to support a range of players in the election space by providing security, performance, and reliability tools to help facilitate the democratic process <figure><img src="http://blog.cloudflare.com/content/images/2024/03/image2-18.png" /></figure><p>In 2024, more than 80 national elections are slated to occur, directly impacting approximately 4.2 billion individuals in places such as Indonesia, the United States, India, the European Union, and more. This marks the most extensive election cycle worldwide until the year 2048. Elections are a cornerstone of democracy, providing citizens with the means to shape their government, hold leaders accountable, and participate in the political process.</p><p>At Cloudflare, we’ve been supporting state and local governments that run elections for free for the last seven years. As we look at the upcoming elections around the world, we are reminded how important our services are in keeping information related to elections reliable and secure from those looking to disrupt these processes. Unfortunately, the problems that election officials face in keeping elections secure has only gotten more complicated and requires facilitating information sharing, capacity building, and joint efforts to safeguard democratic processes.</p><p>At Cloudflare, we support a range of players in the election space by providing security, performance, and reliability tools to help facilitate the democratic process. With <a>Cloudflare Impact projects,</a> we have found a way to protect a range of stakeholders who play an important role in the election process and better prepare them for the unexpected. As we have grown our various Impact projects to protect more than 2,900 domains, we have learned how best to protect vulnerable groups online.</p><p>During Security Week, we want to provide a look at how we are preparing groups that work in elections around the world for 2024, as well as exploring emerging threat trends.</p><h3>A look at the year ahead</h3><p><a>State and local governments</a> play a critical role in various aspects of the election process. From voter registration to candidate filing, polling place setup, distribution of ballots, tabulations of voters, and reporting of election results, they ensure that elections are conducted fairly, securely, and efficiently.</p><p>If we have learned anything from the last seven years, it is that election officials have even more on their plate when it comes to conducting free and fair elections. Countries conducting elections this year are likely to face a complicated array of threats, from voter manipulation to physical violence. Unfortunately, in many countries, people have been blamed for election results that displeased certain politicians and constituents, and numerous election officials have encountered death threats, online harassment, and mistreatment. In April 2023, the <a>Brennan Center found that 45%</a> of local election officials said they fear for the safety of their colleagues.</p><p>When it comes to safeguarding online infrastructure, securing voter registration systems, ensuring the integrity of election-related information, and planning effective incident response are necessary as online threats grow more and more sophisticated. For example, in the three months leading up to the 2022 US midterm elections, <a>Cloudflare prevented around 150,000 phishing emails</a> targeting campaign officials.</p><h3>How we use our services to promote free and fair elections</h3><p>The core principle driving our work in the election space is the idea that access to accurate voting information, as provided by state and local governments, is fundamental to the proper functioning of democracy. We see ourselves as one piece of a larger puzzle when it comes to safeguarding elections.</p><p>Protecting election entities is an enormous task, and there is strength in partnerships that provide with a broad range of roles and expertise. We have seen groups such as the Cybersecurity and Infrastructure Security Agency<a> increase their role in boosting election security</a> efforts throughout the last few years. There have been partnerships between governments, organizations, and private companies assisting election officials with the tools and expertise on the best ways to secure the democratic process.</p><p>In 2020, <a>we partnered</a> with the International Foundation for Electoral Systems to find a way to expand our protections to election management bodies outside the United States. In our partnership, we have been able to provide our Enterprise-level services to six election management bodies, including the Central Election Commission of Kosovo, State Election Commission of North Macedonia, and many local election bodies in Canada.</p><blockquote><em>“Cloudflare is a technology enabler for the State Election Committee (SEC) in North Macedonia, and its tools help us ensure that early election results will be accessible to the general population, thus promoting visibility and transparency.” </em><br /><strong><em>- Vladislav Bidikov, </em></strong><em>Cybersecurity Task Force Member, State Election Commission of North Macedonia </em>       </blockquote><h3>Internet trends during elections</h3><p>Looking at Internet trends during elections, we have seen in several countries that Internet traffic typically drops during the day, when people are going to the polling booths. That was the case in <a>France</a> and <a>Brazil</a> in 2022, for example. After the polling booths close, traffic usually increases, when citizens are looking for results — a spotlight also shared with the traditional TV channels.</p><p>Indonesia, a country with more than 200 million voters (and a population of 275 million) and over 17,000 islands, held <a>general elections on Wednesday, February 14</a>. On that day, daily traffic dropped 5% compared with the previous week. Hourly traffic during the day dropped as much as 15% between 08:00 and 13:00 local time (Western Indonesia time, where most of the population lives), when polling stations were open. Traffic was lower than in the previous week during that day, and only picked up on the following day.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Untitled.png" /></figure><p>On the other hand, mobile device usage was at its highest point of 2024 to date on February 14, representing 77% of all requests from the country.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Untitled--1-.png" /></figure><h3>Pakistan election day Internet outage</h3><p>In Pakistan, general elections were held on February 8. During this time, our data shows an outage that started around 02:00 UTC, recovering after 15:00. The Internet shutdown targeted mobile networks and was criticized by <a>Amnesty International</a>.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Untitled--2-.png" /></figure><p>The Telenor (AS24499), Jazz (AS45669), and Zong (AS59257) mobile networks were impacted. For example, here is a view of the Telenor network:</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Untitled--3-.png" /></figure><p>In addition, social media platform X experienced a <a>national-scale disruption</a> following protests ignited by allegations of vote rigging in the general elections. When it comes to Internet shutdowns, we see complete Internet blackouts represent the most severe type of Internet shutdowns, but limitations on the usage of social media and messaging applications, especially during elections, also pose large obstacles. Many of these platforms have become indispensable for journalists and the media, serving as an important channel to connect with audiences, share and publicize their content, and securely communicate with their sources.</p><h3>How do you prepare for the unexpected?</h3><p>We have detailed our work during many elections in the United States, including how we protected the <a>2020 elections</a> during times of uncertainty. As we prepare for the 2024 election, we will continue collaborating with experts on how to best provide our services. Last year, we conducted an<a> analysis on threats</a> to election groups. Highlights include:</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/image10-4.png" /></figure><p>Early in 2024, we conducted webinars for state and local governments under the Athenian Project to identify configuration recommendations and provide lessons learned during the 2020 and 2022 midterms in the United States. We discussed topics such as preventing website defacement, and security checklist items such as checking domain and SSL certificate expiration dates. We are happy to report that many of these efforts in assisting state and local governments on configurations to make sure they are getting the most of our free Cloudflare products have been successful, with more than 92% of domains under the project using our<a> proxy services </a>to protect their website. But we still have a long way to go. We found that <a>2FA</a> is still a problem, and we strongly encourage participants to enable it to protect accounts and sensitive information.</p><p>Ahead of the elections, we have also heard from larger election entities, such as secretaries of state, <a>nonprofit organizations</a> supporting election officials, and <a>government agencies</a>, who have reached out for our expertise on how to better support smaller election groups.</p><h3>What keeps state and local election officials up at night?</h3><p>To help prepare for the 2024 general elections in the United States, we wanted to learn more from state and local governments protected under the Athenian Project about what worries them in terms of online security threats. We sent out a brief survey to participants and found:</p><ul><li>A majority of participants believe that the use of <a>generative AI tools</a> will have a significant impact on the 2024 election.</li><li>80% of participants surveyed indicated that their team has experienced an email phishing attack in the last year.</li><li>Trust and reputation is the highest concern when it comes to a cyber attack with election operations as a close second.</li></ul><p>We asked participants what they wished more people understood about their efforts in election security and reliability, and one county's response stood out. To paraphrase, they said that election officials are also citizens and residents in their communities, and they strive to have safe, fair elections. We look forward to learning more about threats to these groups and how our products can help keep their internal data safe from attacks.</p><h3>Super Tuesday</h3><figure><img src="http://blog.cloudflare.com/content/images/2024/03/image11-1.png" /></figure><p>Because Super Tuesday in the United States involves several states, including California, Alabama, Iowa, North Carolina, and more, that hold their primaries or caucuses on the same day, it is often seen as a critical turning point in the presidential primary process.</p><p>On March 6, 2024, <a>CISA reported </a>there had been no credible digital threats to Super Tuesday, to the relief of many security experts. These comments came after <a>Meta reported an outage</a> that which caused Facebook, Messenger, and Instagram to be inaccessible to many users in the United States.</p><p>During Super Tuesday, we had the opportunity to witness firsthand the benefits of having access to free cybersecurity services to a range of elections groups. We are happy to report that during this time, we did not see any major cyberattacks against these groups. As part of this, we want to share updated insights into trends we have identified against election groups we protect to identify the types of attacks that they face with the hope of better securing them online.</p><h3>Athenian Project</h3><p>Under the Athenian Project, we protect more than 400 state and local government websites in 32 states that run elections. We identified 100 websites in the 16 states conducting elections on Super Tuesday and observed a considerable increase in traffic after Monday, March 4th.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Untitled--4-.png" /></figure><p>When it comes to automated traffic to these websites, the figure below shows that we saw traffic classified as bot traffic maintain a relatively steady pattern between February 26 and March 5th. <a>Bot traffic</a> describes any non-human traffic to a website or an app, and it is important to note that not all bot traffic is malicious. Legitimate bot traffic includes activities like search engine indexing, while malicious bot traffic is designed to engage in fraudulent activities such as spamming, scraping content for unauthorized use, or launching distributed denial-of-service (DDoS) attacks.</p><p>As March 5th began, an increase in “human” traffic was clearly visible, with a significant increase starting at 05:00 EST and decreasing around 23:00. This is typical of what we see in the election space, as many people are visiting these websites to identify their polling place locations, or view up-to-date election results.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Untitled--5-.png" /></figure><p>On Super Tuesday, Cloudflare mitigated over 18.9 million requests on March 5th, 2024, against state and local governments under the Athenian project.</p><h3>Cloudflare for Campaigns</h3><p>In 2020, <a>we partnered with Defending Digital Campaigns</a>, a nonprofit organization dedicated to providing cyber security resources and assistance to political campaigns and committees in the United States. Through our partnership, we have been able to provide more than $3 million in Cloudflare products. For this analysis, we identified 49 websites protected by <a>Cloudflare for Campaigns</a> that are located in the states that conducted an election during Super Tuesday. In total, we protect 97 campaign websites and 27 political party websites.</p><p>Overall traffic to these websites remained fairly consistent through the latter half of February and into March, but started to grow the weekend ahead of Super Tuesday, as seen in the figure below. Peaks were seen at 23:00 EST on March 4 and 20:00 EST on March 5.</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Untitled--6-.png" /></figure><p>We’ve noticed that these websites under Cloudflare for Campaign zones experience low, constant bot traffic, although it increased slightly during the first days of March. But the figure below shows that the overall increase in traffic discussed above was driven by a significant increase in request traffic identified as coming from actual users (that is, “human”).</p><figure><img src="http://blog.cloudflare.com/content/images/2024/03/Untitled--7-.png" /></figure><p>A majority of the traffic was to political parties protected under the project in these Super Tuesday states, with 53% of the traffic identified going to these party websites.</p><h3>Project Galileo</h3><p>Cloudflare protects more than 65 Internet properties in the United States that work on a range of topics related to voting rights and promoting free and fair elections. Super Tuesday resulted in a considerable spike in traffic to these websites around 09:00 EST of 3.22M requests, which far surpassed the previous maximum value of 1.56M on February 20th at 11:00 EST, a 2x increase.</p><p>This spike was determined to be from user-driven traffic (not bot) and caused by a single zone related to a nonpartisan nonprofit organization that provides online voter guides for every state, including voter registration forms. The organization has been protected under Project Galileo since 2017. Their request traffic experienced a 1360% increase in traffic between 07:00 and 09:00 am EST. This is a clear example on the importance of access to cybersecurity tools in advance of a major event, as spikes in traffic can be unpredictable.</p><h3>2024 and beyond</h3><p>As we approach the 2024 election cycle, Cloudflare is ready to provide support to election officials, voting rights groups, political campaigns, and parties involved in elections.</p><p>With a year full of elections and given the global attention on election security, engagement of seasoned professionals with expertise is essential to safeguard the democratic process. Through continued collaboration with stakeholders in the election space, we continuously develop strategies for effectively securing web infrastructure and internal teams. Our commitment persists in safeguarding resources throughout the voting process and fostering trust in democratic institutions around the world.</p><p>We want to ensure that all groups working to promote democracy around the world have the tools they need to stay secure online. If you work in the election space and need our help, please apply at <a>https://www.cloudflare.com/election-security</a>.</p><div> </div><p>Tune in for more news, announcements and thought-provoking discussions! Don't miss the full <a>Security Week hub page</a>.</p> Security Week Election Security Jocelyn Woolbright