{"id":1601,"date":"2011-05-25T09:09:31","date_gmt":"2011-05-25T17:09:31","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=1601"},"modified":"2022-04-05T00:38:47","modified_gmt":"2022-04-05T07:38:47","slug":"microsoft-hotmail-exploit-stealing-email-%e2%80%93-what%e2%80%99s-the-exposure","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2011\/05\/microsoft-hotmail-exploit-stealing-email-%e2%80%93-what%e2%80%99s-the-exposure\/","title":{"rendered":"Microsoft Hotmail Exploit Stealing Email \u2013 What\u2019s the Exposure?"},"content":{"rendered":"<p>When asked what personal email you use, most will immediately reply with Gmail, Facebook Mail, or Yahoo Mail while a select few of us will admit to using Microsoft Hotmail. Why? Speculation would be that it is because Hotmail is viewed as \u201cold\u201d and \u201cklunky\u201d. But that is pure speculation.<\/p>\n<p><!--more-->So when the admission by <a href=\"http:\/\/www.darknet.org.uk\/2011\/05\/hotmail-exploit-has-been-silently-stealing-e-mail\/\" rel=\"nofollow,noopener\" >Microsoft that a Hotmail exploit is stealing email, <\/a>many may have replied well so what, no one uses Hotmail anymore, right?<\/p>\n<p>Wrong!<\/p>\n<p>Using data from the most recent <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/application-usage-and-threat-report\">Application Usage and Risk Report (May 2011)<\/a>, Hotmail and email in general, generated these impressive statistics:<\/p>\n<ul>\n<li>56 email variants were      found in use, collectively consuming 5.4% of the overall bandwidth      observed (1.5 exabytes).<\/li>\n<\/ul>\n<ul>\n<li>Webmail, defined as those      email applications most commonly used for personal use and supposedly dying      due to the explosive growth of social networking has shown a 5 fold year-over-year      increase in usage based on the percentage of bandwidth consumed.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.paloaltonetworks.com\/researchcenter\/wp-content\/uploads\/2011\/05\/email-im-sn.png\"><div style=\"max-width:100%\" data-width=\"300\"><span class=\"ar-custom\" style=\"padding-bottom:58%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-medium wp-image-1605 lozad\" title=\"email-im-sn\"  data-src=\"http:\/\/www.paloaltonetworks.com\/researchcenter\/wp-content\/uploads\/2011\/05\/email-im-sn-300x174.png\" alt=\"\" width=\"300\" height=\"174\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2011\/05\/email-im-sn-300x174.png 300w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2011\/05\/email-im-sn.png 524w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/span><\/div><\/a><\/p>\n<ul>\n<li>Hotmail is the 3<sup>rd<\/sup> most frequently used email program with only Gmail and the mail protocol SMTP      found more often.<\/li>\n<\/ul>\n<ul>\n<li>Hotmail is the 4<sup>th<\/sup> most heavily used email application in terms of bandwidth consumed. Hotmail consumed 173 Petabytes of bandwidth which amounts to 1% of the overall traffic observed and more impressively, 12% of the total email traffic observed. Only Gmail, Exchange, SMTP consumed more bandwidth.<\/li>\n<\/ul>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\" width=\"516\">\n<tbody>\n<tr>\n<td width=\"120\" valign=\"top\">Email   Program Found<\/td>\n<td width=\"138\" valign=\"top\">Bandwidth Consumed (in   Petabytes)<\/td>\n<td width=\"126\" valign=\"top\">% of Total Bandwidth Observed<\/td>\n<td width=\"132\" valign=\"top\">% of Email Bandwidth Observed<\/td>\n<\/tr>\n<tr>\n<td width=\"120\" valign=\"top\">SMTP<\/td>\n<td width=\"138\" valign=\"top\">469 PB<\/td>\n<td width=\"126\" valign=\"top\">2%<\/td>\n<td width=\"132\" valign=\"top\">31%<\/td>\n<\/tr>\n<tr>\n<td width=\"120\" valign=\"top\">MS-Exchange<\/td>\n<td width=\"138\" valign=\"top\">254 PB<\/td>\n<td width=\"126\" valign=\"top\">1%<\/td>\n<td width=\"132\" valign=\"top\">17%<\/td>\n<\/tr>\n<tr>\n<td width=\"120\" valign=\"top\">Gmail<\/td>\n<td width=\"138\" valign=\"top\">213 PB<\/td>\n<td width=\"126\" valign=\"top\">1%<\/td>\n<td width=\"132\" valign=\"top\">14%<\/td>\n<\/tr>\n<tr>\n<td width=\"120\" valign=\"top\">Hotmail<\/td>\n<td width=\"138\" valign=\"top\">178 PB<\/td>\n<td width=\"126\" valign=\"top\">1%<\/td>\n<td width=\"132\" valign=\"top\">12%<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>So to say that the risk is low because no one uses Hotmail is presumptuous, and as the article comments referenced above indicate, Hotmail is indeed used by corporate customers as their business email system. Additionally, employees are known to, for whatever reason, use their personal email accounts for business purposes. Regardless, the exploit is significant. The response to the public appears to be insufficient.<\/p>\n<p>Note: The Application and Usage and Risk Report (7<sup>th<\/sup> Edition, May 2011):\u00a0 The report summarized 1,253 traffic assessments performed worldwide between Oct 2010 and April 2011. Total bandwidth observed was 28 exabytes and the number of applications discovered was 1,043. Frequency indicates that the application used was found at least once during the assessment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When asked what personal email you use, most will immediately reply with Gmail, Facebook Mail, or Yahoo Mail while a select few of us will admit to using Microsoft Hotmail. Why? Speculation &hellip;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[31,1814,39],"coauthors":[800],"class_list":["post-1601","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-application-control","tag-application-usage-risk-report","tag-data-leakage"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1601"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1601\/revisions"}],"predecessor-version":[{"id":1609,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1601\/revisions\/1609"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1601"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=1601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}