Skip to main content

Email encryption flaw gives hackers full access to your secret messages

Researchers at the Munster University of Applied Sciences discovered vulnerabilities in the Pretty Good Protection (PGP) and S/MIME technologies used to encrypt email. The problem resides in how email clients use these plug-ins to decrypt HTML-based emails. Individuals and companies are encouraged to disable PGP and/or S/MIME in their email clients for now and use a separate application for message encryption. 

Called EFAIL, the vulnerability abuses “active” content rendered within HTML-based emails, such as images, page styles, and other non-text content stored on a remote server. To successfully carry out an attack, the hacker must first have the encrypted email in possession, whether it’s through eavesdropping, hacking into an email server, and so on. 

Recommended Videos

The first attack method is called “Direct Exfiltration” and abuses vulnerabilities in Apple Mail, iOS Mail, and Mozilla Thunderbird. An attacker creates an HTML-based email comprising of three parts: the start of an image request tag, the “stolen” PGP or S/MIME ciphertext, and the end of an image request tag. The attacker then sends this revised email to the victim. 

Please enable Javascript to view this content

On the victim’s end, the email client first decrypts the second part and then combines all three into one email. It then converts everything into an URL form starting with the hacker’s address and sends a request to that URL to retrieve the nonexistent image. The hacker receives the image request, which contains the entire decrypted message. 

The second method is called the “CBC/CFB Gadget Attack,” which resides within the PGP and S/MIME specifications, affecting all email clients. In this case, the attacker locates the first block of encrypted plaintext in the stolen email and adds a fake block filled with zeroes. The attacker then injects image tags into the encrypted plaintext, creating a single encrypted body part. When the victim’s client opens the message, the plaintext is exposed to the hacker. 

Ultimately, if you don’t use PGP or S/MIME for email encryption, then there’s nothing to worry about. But individuals, companies, and corporations who use these technologies on a daily basis are advised to disable related plugins and use a third-party client to encrypt emails, such as Signal (iOS, Android). And because EFAIL relies on HTML-based emails, disabling HTML rendering is also advised for now. 

“This vulnerability might be used to decrypt the contents of encrypted emails sent in the past. Having used PGP since 1993, this sounds baaad (sic),” F-Secure’s Mikko Hypponen wrote in a tweet. He later said that people use encryption for a reason: Business secrets, confidential information, and more.  

According to the researchers, “some” email client developers are already working on patches that either eliminates EFAIL altogether or makes the exploits harder to accomplish. They say the PGP and S/MIME standards need an update, but that “will take some time.” The full technical paper can be read here. 

The problem was first leaked by the Süddeutschen Zeitun newspaper prior to the scheduled news embargo. After the EFF contacted the researchers to confirm the vulnerabilities, the researchers were forced to release the technical paper prematurely.

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
OpenAI showing a ‘very dangerous mentality’ regarding safety, expert warns
ChatGPT and OpenAI logos.

An AI expert has accused OpenAI of rewriting its history and being overly dismissive of safety concerns.

Former OpenAI policy researcher Miles Brundage criticized the company's recent safety and alignment document published this week. The document describes OpenAI as striving for artificial general intelligence (AGI) in many small steps, rather than making "one giant leap," saying that the process of iterative deployment will allow it to catch safety issues and examine the potential for misuse of AI at each stage.

Read more
M3 Ultra vs. M4 Max: Which is better? Benchmarks can’t tell either
2025 Mac Studio

Apple surprised us with its announcement of the new Mac Studio this week, and confused us with its chip choices -- the M4 Max and the M3 Ultra. It's hard enough to tell which chip is more powerful just from their names, but according to early benchmarks, it's also hard to tell from their CPU performance.

https://x.com/VadimYuryev/status/1897849477706481701?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1897849477706481701%7Ctwgr%5E8073e41e643559d3c995c3a698fc2b5523a61222%7Ctwcon%5Es1_&ref_url=https%3A%2F%2F9to5mac.com%2F2025%2F03%2F06%2Fm3-ultra-m4-max-chip-benchmark%2F

Read more
AMD’s RX 9070 XT could soon cost a lot more than it does now
An Asus RX 9070 XT TUF GPU.

After the way Nvidia's RTX 50-series ended up being called a "paper launch," many breathed a sigh of relief when AMD's RX 9000 series appeared on the shelves in much larger quantities. However, once this initial shipment is sold, AMD could face the same problem as the rest of the best graphics cards: Price hikes, price hikes everywhere.

The cards officially hit the shelves yesterday, and many were spotted far above the recommended list price (MSRP), with some overclocked models priced at up to $250 more than the $600 starting price. However, AMD spoke several times about working with its partners to ensure wide availability at MSRP, and indeed, many retailers had some models up for sale. Those MSRP cards were only around for a short time, though, and they might never come back, according to retailers.

Read more