PGP Encrypted Emails At Risk From ‘eFail’ Attacks

German researchers have warned those using a popular form of email encryption that serious flaws mean their messages could be decoded by attackers.

The two attacks, details of which were published on Monday in a research paper, affect PGP, the most popular technology for sending encrypted emails. There’s currently no fix, researchers said.

Sebastian Schinzel, lead of the IT security lab at the Münster University of Applied Sciences, said the paper would be published ahead of a scheduled date later this week after the embargo was broken. The paper credits eight German researchers, including Schninzel, with the Munster University of Applied Sciences, Ruhr University Bochum and KU Leuven.

The Suddeutsche Zeitung newspaper published details of the exploits on Monday morning.

eFail

In a website devoted to the issues, which the researchers called eFail, they said the attacks exploit problems with the OpenPGP and S/MIME standards and can expose the plaintext of encrypted emails.

More particularly, the attacks use specially crafted HTML emails that exploit bugs in the way PGP is implemented in some email programs.

“In a nutshell, eFail abuses active content of HTML emails, for example externally loaded images or styles, to exfiltrate plaintext through requested URLs,” they wrote.

The attacker needs to first access encrypted emails, which could have been collected years ago. Then the emails are changed in a particular way and sent to a victim.

“The victim’s email client decrypts the email and loads any external content, thus exfiltrating the plaintext to the attacker.”

No patches available

The way the attacks function means that users can protect themselves by switching off HTML in their email clients or by using an external program, rather than an email client plugin, to decrypt messages, the researchers said.

In the longer term they said patches for email client plugins and changes to OpenPGP and S/MIME could prevent any problems.

The Electronic Frontier Foundation (EFF) had earlier warned users that the attacks posed “an immediate risk”.

“Our advice, which mirrors that of the researchers, is to immediately disable and/or uninstall tools that automatically decrypt PGP-encrypted email,” the organisation wrote.

Werner Koch of GNUPrivacyGuard (GnuPG), an open source PGP privacy suite, said the EFF’s warning was “overblown” and said he hadn’t been contacted. He recommended switching off HTML emails or using authenticated encryption.

Other methods of sending encrypted messages, such as Signal, Apple’s iMessage and Threema have recently become more widely used, creating alternatives to PGP for those in need of secure communications.

Do you know all about security? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Tesla To Ask Shareholders To Reinstate Elon Musk’s $56 Billion Package

Tesla shareholders to be asked to reinstate Elon Musk's $56 billion pay package, days after…

7 hours ago

Telegram To Reach One Billion Users Within Year

Catching WhatsApp? Billionaire founder of Telegram claims encrypted platform will reach one billion users within…

8 hours ago

Judge Dismisses Some Harm Claims Against Meta, Zuckerberg

Good news for Mark Zuckerberg as judge dismisses some claims in dozens of lawsuits alleging…

10 hours ago

Google Begins Removal Of California News Ahead Of Proposed Law

Consequences of Assembly Bill 886. Google begins removing California news websites from some search results

11 hours ago

Tim Cook Says Apple Considering Factory In Indonesia

CEO Tim Cook during visit to Jakarta says Apple will look into building a manufacturing…

11 hours ago

Canada To Implement Digital Services Tax This Year

Introduction of digital services tax on tech firms will begin in 2024 Canadian government confirms,…

15 hours ago