NSA Server vulnerable to SMTP Spoofing, can be used for Social Engineering
NSA Server vulnerable to SMTP Spoofing, can be used for Social Engineering: An Indian hacker known as “Godzilla” has identified a vulnerability in the NSA website that allows an attacker to send fake emails from NSAs SMTP server.
NSAs SMTP server allows anyone to use the service without verifying the IP address and password. The most interesting part is that it allows you to use any email addressfor eg: admin@nsa.gov.
This vulnerability can be exploited by an attacker for launching a Spear phishing attack. An attacker can send email to anyone inside the organizationfor eg to: admin2@nsa.gov.
As it is using the NSA SMTP server, it is need not to worry about firewalls. In a screenshot provided to EHN, the hacker used the email id of the NSA Director “Gen Keith B Alexander”KeithAlexander@nsa.gov to send email to another email id. “sending a mail with a link attach to it. That can be a bot link. Everyone will receive the mail with .nsa.gov domain as the mail is shooted from the same network.” The hacker said.
Sponsored Links”The mail will be send with the name of Director as no one will dare to skip the mail and have to read it. After opening the mail the attacking vector will get active. After this the ball will be in the attackers court.”