Could SPF, DKIM, and DMARC Passing Indicate Misconfigurations or Abuse of Email Infrastructure?

0
0
Asked By TechieTurtle99 On

We received what seem to be phishing emails from Truist, but interestingly, these emails are passing SPF, DKIM, and DMARC checks. The emails appear to be originating from legitimate infrastructure associated with Truist's legacy systems based on the headers we examined. Given that we noticed this verification success, could it mean that their email infrastructure is compromised or misconfigured? If these checks pass, how can illegitimate emails still get through?

7 Answers

Answered By NetworkNinja88 On

It's possible that a legitimate email account was compromised. If they altered their DNS to set up their own DKIM keys, they may still be using Truist's servers to send emails while appearing authentic. Given that the email looks like it’s coming from within their domains, that could explain the SPF validation.

CuriousCat42 -

Yeah, we faced a similar situation, and later received an apology from the bank when they realized a staff member had their account phished, which led to legit-looking emails being sent to their entire contact list.

Answered By EmailExpert99 On

As the recipient, your mail transfer agent (MTA) should verify DKIM signatures and SPF alignment accurately. If the incoming email seems suspicious but the checks pass, you might want to investigate the SPF records for any IP alignment issues. If that’s all fine, the DKIM signing or the MTA from their end might be problematic.

Answered By InformedUser On

Just a note that since Truist acquired BB&T, all this infrastructure now belongs to them.

Answered By SecuritySleuth On

I've noticed a rise in Direct Send exploits recently. This allows actors to spoof internal addresses while bypassing DMARC protections. Given the size of their operation, this exploitation could have led to significant issues and impacts on their clients, so they may need to disable Direct Send features.

Answered By SysAdminPro On

It seems more likely that their infrastructure is being abused rather than outright compromised. Common reasons include misconfiguration, open relays, or a compromised mailbox sending emails through their legitimate mail transfer agents. Also, some marketing platforms might allow anyone to send emails as @bbandt.com without thorough vetting. Just remember, SPF, DKIM, and DMARC only ensure the mail is from authorized infrastructure, not that the content is legitimate. It’s a good idea to forward the suspicious headers to their security team; they’d want to look into it.

Answered By ThoroughThinker On

While many are suggesting they were compromised, it could simply be a misconfiguration that led to this situation.

Answered By TechWhiz12 On

If DKIM passes, that means the email is signed with the correct key. This suggests either their DNS has been compromised, altering the SPF/DKIM records, or their mail server (which holds the signing key) is compromised.

SharpShooter56 -

Just to clarify, in this case, it's about Truist's infrastructure, not ours.

WiseOwl77 -

Make sure you read carefully before responding!

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.