Critical flaw in Mozilla Thunderbird, Apple and Outlook emails leaves encrypted messages vulnerable to hackers, researchers say
Whistle-blowers, political activists and others who depend on secure messaging could all be compromised by the bug
Security researchers said Monday they have discovered a critical flaw in the way certain email programs handle a popular encryption technology that safeguards emails from prying eyes.
The flaw, known as EFAIL, affects applications such as Mozilla Thunderbird, Apple Mail and some versions of Outlook, the European researchers said. EFAIL targets the encryption standard known as PGP, or Pretty Good Privacy, and S/MIME, a similar protocol commonly used.
Whistle-blowers, political activists and others who depend on encrypted email could all be compromised by the bug, the researchers said in a blog post. The Electronic Frontier Foundation, a separate technology advocacy group that previewed the researchers’ findings on Sunday, said users of the affected email programs should disable any third-party software they have installed that allow the email apps to use PGP or S/MIME.
“Until the flaws described in the paper are more widely understood and fixed, users should arrange for the use of alternative end-to-end secure channels, such as Signal, and temporarily stop sending and especially reading PGP-encrypted email,” EFF said.
The flaw works when an attacker already has access to a victim’s encrypted emails. The vulnerability allows hackers to read an encrypted email by making changes to its HTML, which essentially tricks the affected email applications into decrypting the rest of the message.
Apple and Microsoft did not immediately respond to a request for comment. Mozilla referred questions to the Thunderbird Council, the third-party open-source software group that maintains the Thunderbird email app. Ryan Sipes, a Thunderbird community manager, said a patch is being developed and will be distributed as an update by the end of the week.
Some security experts said because EFAIL seems to affect specific email applications, it is an exaggeration to say that there is a flaw in the actual underlying encryption protocols.
Werner Koch, the principal author of the cryptographic software GNU Privacy Guard, called EFF’s warnings about the vulnerability “pretty overblown”. In a post on Monday, he said his team was not contacted about the flaw and the attack could be mitigated by avoiding HTML emails or using authenticated encryption, which adds a layer of protection to confirm the message has not been changed. Still, some developers of PGP software for email apps are not taking any chances.
GPGTools tweeted “‘Efail’: as a temporary workaround against ‘efail’ …, disable ‘Load remote content in messages’ in Mail → Preferences → Viewing.
“GPG Suite 2018.2 which mitigates against this attack is coming very soon.”
Rather than deal with email encryption issues at all, others said, just switch to an encrypted messaging app that does not require any third-party plug-ins.
Barton Gellman tweeted “The best advice TBH is just to stop using GPG / PGP (for most purposes) and start using Signal. Safer, easier, free, works on your phone at least as well as on a computer. Messages, attachments, audio or video calls. Just get it.”