Protecting your organization from SubdoMailing: Insights from industry experts

In early 2024, a new and alarming threat emerged in the realm of DNS security: SubdoMailing. This vulnerability has exposed significant weaknesses in DNS hygiene, allowing malicious actors to launch phishing campaigns, distribute malware, and tarnish brand reputations by circumventing existing email security measures like DMARC. 

Recognizing the gravity of this issue, Red Sift teamed up with industry leaders Spamhaus and Markmonitor to share strategies on identifying and mitigating these risks. Watch the live session on demand here:

Understanding SubdoMailing and DNS Vulnerabilities

During the live discussion, the panel of experts delved into the specifics of SubdoMailing and its implications. The session kicked off with Red Sift’s Billy McDiarmid and Faisal Misle emphasizing the urgency of addressing this vulnerability and the importance of understanding the nature of SubdoMailing to effectively safeguard DNS systems.

Prudence Malinki, Head of Industry Relations at Markmonitor, explained that SubdoMailing exploits weak DNS configurations, allowing attackers to create malicious subdomains under legitimate domains. These subdomains can then be used to send deceptive emails that bypass DMARC checks, making them appear authentic to unsuspecting recipients. This technique undermines trust and opens the door to various cyber threats.

Strategies for Proactive DNS Protection

Carel Bitter, Head of Data at Spamhaus, provided insights into proactive measures organizations can take to defend against these threats and emphasized the importance of maintaining robust DNS hygiene. This involves regularly auditing DNS records, ensuring that all subdomains are accounted for and properly configured, and implementing stringent access controls.

One of the key strategies discussed was the importance of using DNS Security Extensions (DNSSEC) to protect the integrity of DNS queries. DNSSEC helps prevent attackers from manipulating DNS responses, thereby ensuring that users are directed to legitimate websites. Bitter also recommended the use of threat intelligence services to stay informed about emerging threats and to quickly respond to potential vulnerabilities.

Steps for Maintaining Robust DNS Hygiene

To maintain a strong defense against SubdoMailing, the panelists outlined several essential steps:

  1. Regular Audits: Conduct regular audits of DNS records to identify and rectify any discrepancies. Ensure that all subdomains are properly listed and secured.
  2. DNSSEC Implementation: Deploy DNSSEC to safeguard the integrity of DNS responses. This adds an extra layer of security by verifying the authenticity of DNS data.
  3. Access Controls: Implement strict access controls to limit who can create or modify DNS records. This reduces the risk of unauthorized changes that could introduce vulnerabilities.
  4. Threat Intelligence: Utilize threat intelligence services to stay updated on new and evolving threats. This enables a proactive approach to DNS security, allowing for swift action when risks are identified.
  5. Collaborative Efforts: Engage with industry groups and security organizations to share information and best practices. Collaborative efforts can enhance overall security posture and provide early warnings about potential threats.

How Red Sift can help

To check your configuration for any SubdoMailers (compromised SPF includes), use Red Sift’s free Investigate tool and get results for your email-sending service in less than 30 seconds.

If your organization needs ongoing protection from domain takeover attacks, Red Sift recently introduced DNS Guardian – a new feature in Red Sift OnDMARC that ensures brands are protected from SubdoMailing attacks, dangling DNS, and CNAME takeovers by continuously monitoring domains for misconfigurations. Get a demo here

PUBLISHED BY

Rebecca Warren

2 Aug. 2024

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Thought Leadership

How the EU can mandate for stronger email security

Antony Seedhouse

Executive summary: The article examines how the EU can proactively close email security gaps by leveraging the NIS2 Directive to mandate robust, harmonized standards like DMARC, DKIM, and SPF across all member states. By acting now, the EU not only protects its digital ecosystem but also sets a global benchmark for cybersecurity best practices.…

Read more
News

Europe’s #1 for DMARC: Red Sift OnDMARC does it again

Francesca Rünger-Field

G2’s Summer 2025 Report has landed, and we’re proud to share that Red Sift OnDMARC remains the #1-rated DMARC solution in Europe. This marks another strong season for OnDMARC, with continued recognition across G2’s category reports. We were featured in 18 reports this quarter, taking top spots in the Mid-Market Results Index and Mid-Market…

Read more
Cybersecurity

Healthcare and cybersecurity: 73% of breaches lack DMARC enforcement

Faisal Misle

The healthcare sector has become a target for both low-level and occasionally spectacularly successful cyberattacks. Hospitals, insurers, medical supply chains, service and medical providers are prime targets for threat actors, with email phishing attacks, ransomware, and data breaches on the rise. In 2024, 94% of U.S. healthcare organizations experienced a cyberattack, with the average…

Read more
BIMI

VMC and CMC: What are the new requirements?

Jack Lilley

Executive Summary: Staying updated on Verified Mark Certificates (VMCs) and Certified Mark Certificates (CMCs) is crucial for organizations aiming to authenticate their logos and enhance brand trust in email communications. Discover the key changes in the latest security requirements and compare the differences between VMCs and CMCs.​ This article: Introduction Verified Mark Certificates (VMCs) and…

Read more