EFAIL is a set of vulnerabilities discovered in 2018 that affected certain email encryption protocols, such as OpenPGP and S/MIME. These vulnerabilities focused on how email clients processed encrypted emails, specifically how they interacted with encryption software. EFAIL highlighted the importance of reliable implementation and secure handling of encrypted communications to maintain the privacy and security of protected health information (PHI).
Email encryption involves encoding the email's contents to ensure it is not accessible to unauthorized persons. Encryption is a requirement of HIPAA as it assures the protection of PHI against potential violations and breaches. The forms of email encryption are:
Cipher Feedback (CBC) and Cipher Block Chaining (CFB) mode attacks exploit OpenPGP and S/MIME encryption vulnerabilities. By manipulating plaintext blocks in the CBC mode, an attacker can inject a malicious image tag into the encrypted plaintext, causing the email clients to unintentionally reveal the plaintext when opened. OpenPGP uses CFB mode, which allows a similar attack using CFB gadgets.
Direct exfiltration attacks target specific email clients like Apple Mail, iOS Mail, and Mozilla Thunderbird. By crafting a multipart email with an unclosed image tag and combining it with encrypted ciphertext, the attacker tricks the email client into sending the plaintext of the encrypted email to the attacker when it requests the image.
Note that EFAIL attacks usually require the user to act, like opening a manipulated email or clicking on a harmful link, to succeed. The effects of these attacks can differ based on the email client used and how it handles encryption.
The 2018 EFAIL attack exposed several vulnerabilities in the email encryption process of email clients that support S/MIME and OpenPGP, which left holes in the protection of PHI. The vulnerabilities include:
These weaknesses in the handling of encrypted emails enabled attackers to exploit vulnerabilities, manipulate the content of the encrypted messages, and subsequently reveal the decrypted information unintentionally. This unintended disclosure exposed encrypted information to the attacker, even without direct access to the encryption keys.
EFAIL-related vulnerabilities have existed for over a decade and present considerable disadvantages to using S/MIME and OpenPGP encryption methods. As such, the following are possible but not foolproof methods of mitigating the risk associated with the use of EFAIL:
Related: PGP and S/MIME aren't as secure as you think
Considering the threat posed to PHI by the EFAIL vulnerabilities associated with using OpenPGP and S/MIME and the additional effort needed to mitigate EFAIL attacks, exploring alternative email encryption options is worthwhile. HIPAA compliant email services like Paubox, which utilize TLS encryption, provide a secure and user-friendly method of communication that involves less work to avoid possible violations or breaches of data.
Paubox now uses TLS 1.3 encryption for all of its solutions, including Paubox Email Suite. When you send encrypted email via Paubox, our platform automatically chooses TLS 1.3 as the default encryption choice, an upgrade that helps maintain our position as the market leader for HIPAA compliant email.
But what happens when an email recipient doesn't support encryption? Paubox has patented its unique approach to email security and encryption, particularly when sending email to addresses that don't support TLS. If a TLS connection cannot be established, Paubox stops your message from being delivered in plain text. Instead, recipients get an email telling them to click on a link to view the message and reply via a secure HTTPS website. In today's healthcare environment, guaranteed TLS encryption is essential for email security.