How to create a data protection policy to monitor and block EchoSpoofing.
EchoSpoofing is a process that allows a bad actor to spoof the From address of domains registered in ClientNet by relaying a message through Office 365. Attackers are then able to bypass email authentication checks when the message is relayed. EchoSpoofing is possible because the Office 365 SMTP relay allows Office 365 customers to send mail from any domain.
Email Security Cloud
In July 2024, a vulnerability in Office 365 was discovered allowing attackers to bypass email authentication checks when a message is relayed. Attackers were able to send millions of spoofed emails impersonating large brands. The phishing emails originated on an SMTP virtual server routed via Office 365 Online Exchange before entering a domain-specific relay server.
Note: Several very specific configuration requirements must be in alignment for an attack to occur, which we will not detail in this article.
Learn how to create a policy in Broadcom Email Security.cloud Data Protection to detect EchoSpoofing.
To detect EchoSpoofing, we'll create a Data Protection policy that looks at the "X-OriginatorOrg" header provided by Microsoft to determine if it matches your domain. If it does not match, you can decide on the appropriate action.
Create a policy to detect EchoSpoofing
Rule 1:
Rule 2: