The UPS SPF scam was a multi-faceted attack that exploited vulnerabilities across several email authentication protocols. The core issue was UPS's overly permissive SPF record, which allowed Microsoft 365 users to send emails appearing to originate from @ups.com. This was compounded by Microsoft's failure to adequately verify domain ownership and prevent abuse. Gmail's display of BIMI logos based solely on SPF passing provided a false sense of security, while relaxed DMARC settings (or misconfiguration of DMARC alignment) allowed spoofed emails to bypass DMARC validation. The return path configuration, using a Microsoft IP covered by UPS's SPF record, further contributed to the success of the scam. The incident highlighted a known flaw in DMARC's reliance on SPF alignment and that the UPS security lapse happened despite repeated warnings about DMARC vulnerabilities. Fixes were swiftly implemented by both Gmail and UPS to address the exploit. Poorly implemented SPF records, generally, create easily abused mechanisms and should be avoided. DMARC relies on correct SPF and DKIM setup to be effective otherwise spoofing can happen.
9 marketer opinions
The UPS SPF scam worked by exploiting a combination of factors: UPS had an overly permissive SPF record, allowing Microsoft 365 users to send emails appearing to be from @ups.com. Gmail displayed BIMI logos even when only SPF passed, which gave the spoofed emails a veneer of legitimacy. This, combined with relaxed DMARC settings, allowed phishers to send authenticated emails impersonating UPS. Subsequently, both Gmail and UPS implemented fixes to address the vulnerability.
Marketer view
Email marketer from LinkedIn explains how the UPS spoofing vulnerability worked: It involved a combination of factors, including Microsoft 365 users being able to send as @ups.com, UPS having a very open SPF record, and Gmail displaying BIMI logos even when only SPF passes. This allowed phishers to send authenticated emails impersonating UPS.
16 Jul 2023 - LinkedIn
Marketer view
Email marketer from Twitter shares how Gmail rolled out a fix for the BIMI exploit where phishers were able to spoof emails.
13 Apr 2022 - Twitter
6 expert opinions
The UPS SPF scam worked by exploiting several vulnerabilities. Microsoft's failure to prevent customers from using domains they don't own was a key enabler. UPS had an overly broad SPF record. This, combined with relaxed DMARC settings and how the return path was configured (using a Microsoft IP covered by UPS's SPF record), allowed spoofed emails to pass DMARC validation. Experts had warned about this DMARC hole for a while, but their warnings were ignored. Poorly implemented SPF records are a significant risk, and DMARC relies on proper SPF and DKIM setup; otherwise, it can fail to prevent spoofing. It was also lucky it was not worse.
Expert view
Expert from Email Geeks explains that the return path was something@ups.com, forwarded via an MS IP covered by the ups.com SPF record, which relaxed alignment with the bogus subdomain in the 822.From, making the DMARC valid.
10 Jul 2021 - Email Geeks
Expert view
Expert from Email Geeks explains that Microsoft is at fault for allowing customers to use domains that don’t belong to them, enabling the spoofing of emails like those from UPS. They have a responsibility to prevent their customers from using domains that don’t belong to them.
14 Mar 2022 - Email Geeks
4 technical articles
The UPS SPF scam exploited vulnerabilities in email authentication protocols. While strong authentication aims to identify and stop spam and build trust, it was bypassed. The key issue was that DMARC checks were passing despite the spoofing. DMARC builds upon SPF and DKIM, but its effectiveness hinges on proper implementation. An overly broad SPF record at UPS allowed unauthorized servers to send emails as if they were from UPS. A narrower SPF record would have prevented the hack. The incident highlights a flaw in DMARC's implementation when SPF alignment is too relaxed, as detailed in IETF RFC 7489.
Technical article
Documentation from Google explains that strong email authentication helps users and email security systems identify and stop spam, and also enables senders to leverage their brand trust, however this was exploited by phishers.
17 Sep 2024 - Google
Technical article
Documentation from IETF RFC 7489 specifies how DMARC is intended to work. The UPS incident shows a flaw in how DMARC is implemented when SPF alignment is too relaxed.
24 Nov 2023 - IETF
Against which domain is SPF checked?
Are SPF, DKIM, and DMARC as important in B2B as in B2C email marketing?
Besides Spamhaus, what blocklists are important for email marketers to monitor?
Can a sender modify SPF records to alter SPF checking behavior?
Can a trademark owner authorize a third party to use their logo for BIMI?
Do SPF and DKIM records need to be aligned for all email service providers?
How can a phishing email pass SPF and DKIM authentication checks?
How can email senders and users prevent and identify phishing emails?
How do SPF, DKIM, and DMARC affect email deliverability with Cvent?