There are several websites available that offer temporary and disposable email addresses, which have become quite popular among Internet users today, as they provide a quick alternative to anyone who wishes for their email address to remain private when sending and receiving emails.
Some of these temporary and disposable email addresses are available only for a few minutes, while others remain publicly available for anyone to access once they have been created. The same goes for websites that offer access to publicly available mobile numbers for receiving text messages (SMS). There is a wide range of numbers available, from different countries.
Effectively, a user can register to an online service by using a publicly available mobile number and receive any verification texts online.
Some may argue that these temporary and disposable email addresses and SMS services provide some sort of privacy. That might be true, especially under specific circumstances, but do not confuse anonymity with privacy, and security.
Entering fake details while using a disposable email allows users to subscribe avoiding any future incoming communications from that particular website to their email or phone, but at what cost?
It is not possible to know who else is reading the outgoing and especially the incoming communication when using these services. Thus:
- Any future communication that may contain sensitive data is going to be publicly available or it will be disclosed to unauthorised third-parties.
- As it is not known who maintains or has access to these services and servers, it is theoretically possible to have the attachments intercepted and infected with malicious code in order to spread malware. The same goes for SMS messages that contain hyperlinks. For example, the links could be replaced automatically, pointing to a different address that has the original link embedded in an iframe.
- The disposable emails, especially the ones with a life span only for a few minutes, have been used in the past for sending sensitive information, avoiding the use of a personal or corporate email.
- Having access to the combination of a temporary email address and a mobile number may allow the takeover of a legitimate account by redirecting all communications to these disposable and publicly available accounts.
Google has already taken steps towards blacklisting these emails and phone numbers.
When trying to register a new email address with Google, the user is being asked for a secondary email address and a mobile number. It is not possible for a user to use any of these disposable email addresses and phone numbers when registering a new account.
Surprisingly enough, even though this is true for Google, it is not true for many other email providers out there. Even more surprising, though, is to see companies within the information security community to have not blacklisted these temporary and disposable email addresses when, for example, registering for a webinar or downloading a whitepaper.
Maintaining a list of these temporary and disposable email addresses it is not an easy task, especially when it comes to the publicly available mobile numbers for receiving text messages.
However, maintaining, contributing and sharing such a list among the information security community will further improve the existing email filtering mechanisms. The following URL is a list of all the domains currently being used as temporary and disposable email addresses:
Putting this list together was not easy but I really hope you find this list useful.
Let me know your thoughts in the comments section below or on Twitter.
About the Author: Dr. Grigorios Fragkos (VP CyberSecurity at Sysnet Global Solutions) is responsible for the ensuring the security of mission critical systems offered by Sysnet to a wide range of high profile clients. Grigorios (aka Greg) has the challenging task of looking towards the emerging Cyber Threats and the future challenges of CyberSecurity by contributing his combined hands-on experience from advanced security services, penetration testing and security research. He has a number of publications in the area of Computer Security and Computer Forensics with active research in CyberSecurity and CyberDefence. His R&D background in Information Security, along with his experience in the CyberDefense department of the military, is invaluable when it comes to safeguarding critical infrastructures and especially for the PCI DSS. Grigorios has been invited to present in a number of security conferences, workshops and summits over the years. Thinking ahead and outside-the-box when dealing with information security challenges is one the key characteristics of his talks. Follow: @drgfragkos
Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.
Title image courtesy of ShutterStock