Who this guide is for
Security leaders, email admins, and web teams who need a clear, actionable plan to stop Adversary‑in‑the‑Middle (AITM) techniques that target email and TLS/HTTPS. Focus areas include DNS spoofing, email hijacking/domain spoofing, SMTP STARTTLS downgrades, HTTPS spoofing, SSL/TLS stripping, and TLS hijacking.
TL;DR
- Enforce DMARC at p=reject to block exact domain impersonation and reduce email-borne AITM.
- Deploy MTA‑STS + TLS‑RPT (or DANE where supported) to prevent SMTP downgrade or impersonation attacks by enforcing encrypted, authenticated delivery of incoming emails.
- Use DNSSEC + CAA to harden certificate issuance pathways and mitigate DNS spoofing.
- Enable HSTS (with preload) to neutralize SSL stripping in browsers; monitor certificates continuously (CT logs, expiry, mis-issuance).
- Continuously discover and authenticate every email sender (esp. SaaS/3rd‑parties), and monitor look‑alike domains.
- Use Red Sift OnDMARC and Red Sift Certificates to stay protected against AITM attacks.
Table of contents
- AITM in context: Why email and certificates are prime targets
- Threats and how they work
- DNS spoofing / cache poisoning
- Email hijacking and domain spoofing
- STARTTLS downgrade (SMTP)
- HTTPS spoofing and SSL/TLS stripping
- TLS/SSL hijacking via rogue/forged certs
- Controls that matter (and how to roll them out)
- Quick wins vs. strategic investments
- 30/60/90‑day implementation plan
- Stakeholders and RACI
- Success metrics and reporting
- Incident playbooks
- Executive FAQ
AITM in context: Why email and certificates are prime targets
Modern communications hinge on identity (who is talking) and channel integrity (that the message wasn’t altered). Adversary‑in‑the‑Middle attacks exploit the gaps between those two factors, commonly targeting:
- Email: Attackers spoof your domain or intercept SMTP paths to phish, insert malicious content, or re‑route messages.
- Web (HTTPS) & TLS: Attackers break HTTPS guarantees through SSL stripping, downgrade, or mis‑issued/forged certs to view/alter traffic.
The result: stolen credentials, invoice fraud, and data exfiltration, often without malware.
Threats and how they work
DNS spoofing / cache poisoning
Goal: Divert victims to attacker‑controlled infrastructure for web or mail (e.g., fake MX, fake A/AAAA).
How it works: Attackers poison resolver caches or exploit weak authoritative responses. Once DNS answers are tampered with, users are directed to impostor web servers or SMTP relays. Business impact: Session hijack, credential theft, delivery interception, and issuance of fraudulent TLS certificates if DNS control is impersonated long enough.
What to look out for
- Sudden MX/NS/A record anomalies
- Certificate issuance for your domains you didn’t request
- Users reporting “your site looks odd” or mixed‑content warnings
How to spot:
- Monitor DNS changes: Use DNS monitoring tools (like DNS change alerts within Red Sift OnDMARC for MX records) to alert you when MX, NS, or A records change unexpectedly. Compare against known baselines or change logs.
- Track certificate transparency logs: Regularly review CT logs or set up automated alerts (i.e. within Red Sift Certificates account) to catch certificates issued for your domains that you didn’t request.
- Watch for user-side warnings: Pay attention to reports of browsers showing mixed-content warnings, invalid certificate errors, or unusual redirects (maybe some screenshots of examples), these can signal tampering or misissued certificates.
Email hijacking and domain spoofing
Goal: Send mail that appears to be from your domain or manipulate delivery paths (BEC, invoice redirection).
How it works: Abuse of lax SPF/DKIM/DMARC, misconfigured third‑party senders, or unprotected parked domains.
Business impact: Payment fraud, reputational damage, response‑based credential theft.
What to look out for
- Sudden rise in failed DMARC alignment
- Spoofed display names / exact‑domain phishing reaching inboxes
- Unvetted SaaS platforms sending on your behalf
How to spot potential issues
- Review DMARC reports regularly: Monitor aggregate and forensic reports for spikes in alignment failures or new sources attempting to send as your domain. (also could make a suggestion to setup Saved view alerting or Threshold alerts within OnDMARC)
- Inspect inbound phishing patterns: Look for messages using your exact domain or familiar display names that bypass filtering (can create transport rules to deal with display name spoofing) these often indicate gaps in authentication or enforcement.
- Audit third-party senders: Periodically review connected SaaS tools and ensure they’re authorized and properly configured to send on your behalf (Another opportunity to reference Saved View alerts and Threshold Alerts within OnDMARC)
STARTTLS downgrade (SMTP)
Goal: Force mail servers to send in cleartext or to a malicious relay. How it works: Attackers strip the STARTTLS advertisement or tamper with MX lookups to divert to an attacker host that pretends to be the destination. Business impact: Confidentiality breach of email in transit; credential/session capture between MTAs.
What to look out for
- TLS‑RPT reports showing repeated failures to negotiate TLS
- Sudden shifts in cipher/version usage or spikes in plaintext delivery
How to spot potential STARTTLS downgrade attacks
- Monitor TLS-RPT and SMTP logs for repeated TLS negotiation failures. Look for frequent "handshake failed", "STARTTLS not offered", or "TLS disabled" messages from multiple senders or a cluster of sending IPs.
- Watch for sudden shifts to weaker TLS versions or ciphers. A spike in TLS 1.0/1.1 or legacy cipher suites in your mail logs or telemetry can indicate forced downgrades.
- Check for spikes in plaintext delivery. Unexplained increases in messages delivered without STARTTLS, or a rise in messages seen on port 25 with no TLS, are red flags.
- Correlate by sending IP and time. If failures come from the same upstream network range or coincide with short time windows, that suggests an active on-path interference.
- Validate MTA-STS and TLS reporting results. MTA-STS failures, policy lookups that suddenly fail, or mismatch errors in TLS-RPT often accompany downgrade attempts.
- Inspect SMTP session traces. Look for sessions where the server advertises STARTTLS but the client falls back or the handshake aborts. A pattern of advertised then missing STARTTLS is suspicious.
- Use packet captures for confirmation. TCP/TLS traces showing a downgrade in ClientHello or repeated TLS alerts help confirm an on-path manipulation.
- Alert on behavior anomalies, not just single failures. One failed handshake may be benign. Trigger investigation when failures are repeated, widespread, or matched with other indicators above.
HTTPS spoofing and SSL/TLS stripping
Goal: Downgrade or remove HTTPS, serving HTTP content or injecting mixed content. How it works: On-path actors block 301/302 HTTPS redirects or suppress TLS, presenting an HTTP page. Users who click through or never reach HTTPS are vulnerable to credential theft and content injection. Business impact: Account takeovers, malware injection, session hijack.
What to look out for
- Reports of the site loading over plain HTTP
- Browser warnings about insecure forms or mixed content
TLS/SSL hijacking via rogue/forged certificates
Goal: Terminate TLS with a certificate the client accepts but you didn’t authorize. How it works: Corporate proxies, compromised CAs, or mis‑issuance enable the attacker to present a chain the client trusts. In mobile/IoT, weak pinning or outdated trust stores help. Business impact: Stealthy decryption and content manipulation.
What to look out for
- New certs in CT logs you did not request
- OCSP/CRL anomalies, unexpected intermediates
Controls that matter (and how to roll them out)
Email authentication and transport security
DMARC at p=reject
- Inventory all sending sources; configure DKIM & SPF (if available) per sender; ensure SPF flattening/permits are within 10‑lookup limit. Or use a DMARC provider like Red Sift who overcomes the SPF lookup limit.
- Phase: none → p=none (monitor) → p=quarantine → p=reject.
- Red Sift OnDMARC helps discover senders via DMARC reports, validate alignment, and safely move to enforcement.
MTA‑STS + TLS‑RPT (or DANE TLSA where available)
- Publish an MTA‑STS policy (mode: enforce; mx: your authorized MX hosts). Validate via TLS‑RPT telemetry.
- Where supported, use DANE with DNSSEC to provide cryptographic binding of MX to cert.
DMARC and DKIM best practice
- Support intermediary forwarding cases; rotate keys; use 2048‑bit DKIM; restrict selectors per platform.
- Implement BIMI (with VMC or a CMC)
- Incentivizes DMARC enforcement and builds user trust in visual identity. Note: Users can benefit from easy Brand Indicators for Message Identification (BIMI) implementation with Red Sift OnDMARC with a newer Common Mark Certificate (CMC), not requiring a trademark like the traditional Verified Mark Certificate (VMC).
Learn more about BIMI implementation with our free guide.
Look‑alike domain monitoring & parked domain protection
- Register high‑risk variants; ensure DMARC p=reject on non‑sending domains.
DNS and certificate hygiene
- DNSSEC on apex and mail subdomains to mitigate spoofing; sign MX, CNAME, and relevant records.
- CAA records to restrict which CAs can issue for your domains; include iodef for mis‑issuance alerts.
- Certificate management: Use short‑lived certs; automate via ACME; enable OCSP stapling; monitor CT logs for mis‑issuance/typosquats. If you're not sure where to start, Red Sift makes certificate easy with Red Sift Certificates.
- Continuous discovery of hostnames/subdomains with exposed services; remove legacy endpoints.
Web/TLS hardening
- HSTS with adequate max‑age (≥ 6 months) and preload for core zones (after validating subdomain readiness). Add includeSubDomains when safe.
- TLS configuration: Enforce TLS 1.2+ (prefer 1.3), disable weak ciphers (3DES, RC4), and legacy renegotiation.
- Cookie and session security: Mark cookies Secure + HttpOnly + SameSite=Lax/Strict; force HTTPS redirects at edge.
- Content integrity: Use Subresource Integrity (SRI) for third‑party JS; avoid mixed content; prefer first‑party hosting for critical assets.
Quick wins vs. strategic investments
Quick wins (days to weeks)
- Move non‑sending domains to DMARC p=reject immediately.
- Turn on TLS‑RPT and review reports weekly.
- Publish CAA restricting to your chosen CA; add iodef email.
- Enable HSTS on marketing sites (staged rollout) and force HTTPS redirects.
- Add monitoring of CT logs for new certs and look‑alike domains.
Strategic (quarters)
- Full DMARC enforcement (p=reject) on primary sending domains across all SaaS platforms.
- MTA‑STS enforce or DANE across all MX; DNSSEC on apex and critical subdomains.
- Web fleet TLS modernization (TLS 1.3, cipher policy, OCSP stapling, automation).
30/60/90‑day plan
Days 0–30 (Assess and Stabilize)
- Inventory email senders; enable DMARC p=none with reporting to a dedicated mailbox.
- Publish TLS‑RPT; collect data from inbound partners.
- Enable HSTS on low‑risk sites; enforce HTTPS redirects.
- Add CAA and begin CT log monitoring.
Days 31–60 (Enforce and Harden)
- Move to DMARC p=quarantine on domains where SPF/DKIM alignment is green.
- Publish MTA‑STS in testing, then enforce for core MX hosts.
- Turn on DNSSEC for apex domain.
- Standardize TLS 1.2+ everywhere; block weak ciphers; secure cookies.
Days 61–90 (Optimize and Prove)
- Move priority domains to DMARC p=reject; BIMI if brand team aligns.
- Expand HSTS across primary zones; evaluate preload readiness.
- Roll out DANE on mail domains where resolvers support it.
- Establish steady‑state dashboards and monthly exec reporting.
Stakeholders and RACI
- CISO / Head of Security — Accountable
- Email/Collaboration Team — Responsible (SPF/DKIM/DMARC, MTA‑STS, TLS‑RPT)
- Network/DNS Team — Responsible (DNSSEC, CAA, CT monitoring)
- Web Platform/DevOps — Responsible (TLS config, HSTS, OCSP, automation)
- Brand/Marketing — Consulted (BIMI, domain portfolio)
- Legal/Compliance — Informed (policy, data protection)
Success metrics and reporting
- % of domains at DMARC p=reject (target: 100% non‑sending; ≥ 90% sending)
- of authenticated senders vs. unknown sources
- % of SMTP sessions meeting MTA‑STS/DANE policy; TLS‑RPT failure rate
- % of web traffic negotiated at TLS 1.3; HSTS coverage across domains
- Time‑to‑detect mis‑issued certificates (via CT) and time‑to‑revoke
- Volume of exact‑domain spoofing observed in SEGs
Incident playbooks
Suspected DNS spoofing
- Validate current DNS state via authoritative queries; compare against baseline.
- Check CT logs for unexpected certs; trigger CA revocation if needed.
- Rotate credentials for affected services; publish incident comms via trusted channels.
- Enable or validate DNSSEC; review registrar/registry locks and MFA.
Email hijacking / spoofing campaign
- Inspect DMARC aggregate for source; block unapproved senders (SPF/DKIM/DMARC updates).
- Escalate domain(s) to p=quarantine/reject; enforce on parked domains.
- User comms: warn, purge via M365/Google rules; update banners.
- Post‑mortem: add BIMI, evaluate look‑alike takedown.
STARTTLS stripping observed in TLS‑RPT
- Identify failing partner MXes; share TLS‑RPT evidence; prefer MTA‑STS enforce.
- If persistent, coordinate alternate secure route or quarantine messages pending fix.
- Review your MX TLS config; enable modern ciphers, valid certs.
SSL/TLS stripping on web
- Confirm HSTS not enabled or insufficient; enable with safe max‑age and test.
- Force HTTPS at edge; remove mixed content; enable SRI for external JS.
- Review CDN/WAF rewrite rules; ensure 301 canonicalization to HTTPS.
Rogue certificate detected
- Verify issuance details; request CA revocation; publish customer advisory if needed.
- Rotate keys/certs on impacted endpoints; confirm OCSP stapling works.
- Strengthen CAA; review ACME credentials; consider sub‑CA scoping with CA.
Get started with Red Sift
We make the process streamlined for busy teams. Choose Red Sift to shut down AITM risk across email and certificates with one focused platform. Red Sift OnDMARC gets you to DMARC p=reject quickly, discovers every sender, aligns SPF and DKIM, and enforces MTA-STS and TLS-RPT.
Red Sift Certificates delivers full TLS visibility, CT log monitoring, automated issuance and renewal, and strong CAA, DNSSEC, and HSTS hygiene.
Get faster time to enforcement, clearer reporting, and fewer spoofing and downgrade attempts. Start with Red Sift and turn policy into measurable protection. Book a free demo today.
Executive FAQ
Q: Will DMARC stop all phishing? A: No. It stops direct domain spoofing (the most convincing kind) and improves downstream filtering. Combine with user training and look‑alike domain monitoring.
Q: Is HSTS enough to stop SSL stripping? A: Yes, when deployed correctly—especially with preload. Without HSTS, first‑visit users can be downgraded.
Q: Do we need both MTA‑STS and DANE? A: Where possible, use both. MTA‑STS is broadly deployable today; DANE provides cryptographic binding when DNSSEC is in place.
Q: What role does Red Sift OnDMARC play? A: It streamlines discovery and authentication of all mail sources, drives you safely to DMARC p=reject, and operationalizes MTA‑STS/TLS‑RPT with clear reporting—closing the top AITM paths over email.
Get started now with a short demo




