Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)
Live worker hosted at https://spamchannel.haxxx.workers.dev
UPDATE (Aug 13 2023): Two days after my DEFCON 31 talk, MailChannels silently decided to require a Domain Lockdown Record in order to send emails from Cloudflare Workers meaning this code doesn't work anymore. However, because they just addressed a "symptom" and not the underlying issue (lack of sender idenitity verification) anyone can still signup on their website (80$) and use their "normal" SMTP relay to spoof all of their customer domains 🤷🏻♂️
As of writing, This allows you to spoof emails from any of the +2 Million domains using MailChannels. It also gives you a slightly higher chance of landing a spoofed emails from any domain that doesn't have an SPF & DMARC due to ARC adoption.
It was released at the Defcon 31 talk SpamChannel: Spoofing Emails From 2 Million+ Domains and Virtually Becoming Satan.
Slides for the talk are here
TL;DR set your Domain Lockdown Record ASAP.
Below are the demos from my Defcon talk demonstrating email spoofing using this Cloudflare Worker.
This video demonstrates spoofing an email from a domain configured with DMARC + DKIM:
This video demonstrates impersonating Satan ([email protected]):
npm i -g wrangler
)wrangler login
and login to your accountwrangler publish
Code was based on @ihsangan's gist.