DKIM replay attacks are characterized by sudden spikes in email volume (especially from unfamiliar IPs), increased DMARC failure reports, rising bounce rates, and potentially resending legitimate emails with malicious content. Detection is difficult as valid signatures are replayed. Check Google Postmaster Tools for 5-10x normal volume increases. Compromised accounts exhibit unusual sending patterns, unauthorized login locations, password changes, new forwarding rules (particularly external), and changes to account settings. Audit logs should be monitored. Mitigation involves implementing MFA, auditing account activity, using short signature validity, monitoring failed SPF checks, employing geo-filtering, and regularly auditing DKIM records.
8 marketer opinions
DKIM replay attacks exhibit symptoms such as a sudden spike in email volume (especially from unfamiliar IPs), increased DMARC failure reports, and a rise in bounce rates. Monitoring email volume, DMARC reports, and bounce rates is crucial. Compromised accounts can be identified through unusual login locations, multiple failed login attempts, password changes the user didn't initiate, unauthorized access to connected apps, and new/changed forwarding rules (especially to external addresses). Implementing MFA, auditing account activity, and geo-filtering are recommended to mitigate risks.
Marketer view
Email marketer from Reddit shares that an indicator of DKIM Replay Attacks is typically an increase in failed SPF checks in combination with DKIM failures from the same sending IP. This is due to the attacker replaying the message from a server they control which is not authorized to send on your behalf.
12 Jan 2022 - Reddit
Marketer view
Email marketer from Email Marketing Forum explains that a sudden spike in bounce rates, especially hard bounces, can indicate that your domain is being used to send spam via a DKIM replay attack. Monitor bounce rates alongside DMARC reports.
23 Mar 2023 - Email Marketing Forum
4 expert opinions
DKIM replay attacks are difficult to detect as attackers reuse valid signatures. Symptoms to watch for include a huge (5-10x normal) increase in email volume visible in Google Postmaster Tools. Double-signing customer mail might be a factor when investigating DMARC report increases. Consider the possibility of compromised accounts as a cause and pay attention to changes in sending patterns, such as unusual recipients.
Expert view
Expert from Email Geeks explains that the described situation doesn't sound like a DKIM replay attack. Typically, a DKIM replay attack would show a huge increase in volume for that DKIM domain in Google Postmaster Tools, like 5 or even 10x normal.
15 Feb 2023 - Email Geeks
Expert view
Expert from Email Geeks asks if the customer's mail that is seeing an increase in DMARC reports is being double signed.
11 Apr 2023 - Email Geeks
3 technical articles
Compromised accounts exhibit unusual email sending patterns (large volumes, unfamiliar recipients) and altered settings (forwarding rules, recovery emails). Audit logs should be monitored for suspicious activity like password changes or sign-in locations. The DKIM standard (RFC 6376) acknowledges replay attacks as a risk and suggests countermeasures like short signature validity and time stamping to mitigate potential harm.
Technical article
Documentation from RFC Editor (RFC 6376) explains that although the standard does not directly prevent replay attacks it highlights the need for implementations to consider the possibility of replay and to implement appropriate countermeasures to mitigate risks where necessary. This can be achieved through short signature validity and time stamping.
29 Aug 2024 - RFC Editor
Technical article
Documentation from Microsoft recommends checking audit logs for unusual activity such as password changes, email forwarding rules being added, or unusual sign-in locations. Also, look for unusual email sending patterns or file access activity.
18 Oct 2021 - Microsoft
How can I use DMARC to prevent spammers from using my domain?
How do I handle spoofing when DMARC reject is set but not enforced on inbound mail server?
How do I troubleshoot DMARC failures and potential DKIM replay attacks affecting email deliverability?
How does DMARC impact email deliverability, and what are the pros and cons of using it?
How to identify and handle email forging and replay attacks?
What are SPF, DKIM, and DMARC, and when are they needed?