Exposure Management

NICER Protocol Deep Dive: Internet Exposure of IMAP and POP

|Last updated on Jan 29, 2025|1 min read
LinkedInFacebookX
NICER Protocol Deep Dive: Internet Exposure of IMAP and POP

Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet way back in January, we had no idea we'd end up with a hefty, 137-page tome of a research report. The sheer length of such a thing might put off folks who might otherwise learn a thing or two about the nature of internet exposure, so we figured, why not break up all the protocol studies into their own reports?

So, here we are! What follows is taken directly from our National / Industry / Cloud Exposure Report (NICER), so if you don't want to wait around for the next installment, you can cheat and read ahead!

IMAP (143/993) and POP (110/995)

Hey, only 55% of email is technically considered spam!

WHAT IT IS: Internet Message Access Protocol, a stateful protocol nearly always used to read and send email, and Post Office Protocol, which operates essentially like a bulk download protocol for mail.

HOW MANY: 4,045,472 nodes running cleartext IMAP instances on TCP/143 and 3,848,675 nodes running ciphertext IMAPS. 4,331,314 nodes running cleartext POP and 3,714,171 nodes running ciphertext POPS.
3,240,919 75%) have Recog fingerprints (nine total service families)

VULNERABILITIES: Lack of two-factor authentication (2FA) in virtually all implementations can turn IMAP and POP into a serious password liability against focused attacks.

ADVICE: Ensure that IMAP and POP accounts are configured with an app-specific password. Consider dropping POP service entirely.

ALTERNATIVES: Whenever possible, prefer IMAPS, with its SSL wrapping, over IMAP.

GETTING: Better! Between 4% and 11% fewer mail client services are exposed than in 2019.

Discovery details

SMTP handles mail inbound to organizations, while POP and IMAP handle the action of individual users collecting that mail to read and reply to. As with SMTP, we've broken down the prevalence of cleartext versus encrypted versions of these services in the charts and tables below, both overall and by country and cloud.

imap-top10-1.png
CountryIMAP (143)IMAPS (993)POP3 (110)POP3S (995)
United States1,402,7071,376,5461,427,1191,347,756
Germany386,092376,780367,597336,128
Japan310,159279,196396,123309,619
Poland286,820278,183286,957272,185
France251,024238,042244,940221,815
Canada149,171145,738150,229139,814
United Kingdom142,433134,132141,653122,933
Netherlands138,202134,078138,549130,015
Russia116,758108,308119,790102,058
Turkey65,52655,54569,85754,418
imap-2.png
ProviderIMAP (143)IMAPS (993)POP3 (110)POP3S (995)
OVHcloud293,785279,854290,942268,917
DigitalOcean52,41053,90949,53147,715
Google48,86351,04048,79350,133
Amazon33,85933,93438,61928,002
Scaleway17,06215,63214,11713,187
QuadraNet9,7639,74410,1159,495
Microsoft5,7975,2018,4744,810
Rackspace3,4182,8123,3912,564
Alibaba2,0001,3993,3551,248
Oracle342361327283

While there are fewer choices in the end-user-accessible mail protocols, we were able to fingerprint IMAP servers by vendor:

IMAP/POP FamilyCount
Dovecot3,068,391
Courier MTA103,604
Exchange Server37,448
Cyrus MTA12,671
Qpopper9,809
Bigfoot Email Tools6,153
Lotus Domino1,102
CCProxy896
E-mail Services845

With that said, we have very little telemetry on a per-version basis. IMAP and POP don't tend to reveal this information in a pre-authenticated way, and we don't have any good tricks in Recog to suss out versions with any sort of accuracy.

NEVER MISS A BLOG

Get the latest stories, expertise, and news about security today.

Subscribe

Attacker’s view

The charts below graph our honeypot connections to IMAP and POP, and while the spikes may, at first, seem like outliers, in fact, IMAP and POP probing seems to always be pretty spikey. For reasons unknown, these scans have a “high seasonality” in statistical parlance—they tend to come in bursts, rather than the usual constancy that we see in other protocol scans.

imap-3.png

Over the course of the measured period, we saw about 7,500 unique usernames being tested for IMAP and POP.  The top 20 usernames tested are:

  1. admin
  2. test
  3. webmaster
  4. backup
  5. info
  6. marketing
  7. contact
  8. support
  9. office
  10. sales
  11. postmaster
  12. mail
  13. abuse
  14. service
  15. spam
  16. master
  17. helpdesk
  18. mailing
  19. newsletter
  20. recruit

Each of these were tried between 4,000 and 8,000 times. Interestingly, on most runs, each user name is tried precisely once, but sometimes, attackers try one username with 500 to 1,000 passwords in a given attempt.

imap-4.png

Our advice

IT and IT security teams should routinely review the costs involved in running their own on-premises mail infrastructure, in terms of not just money, but time and expertise. If at all possible, they should see about moving off to a professionally maintained email provider, like Outlook 365 or Google G Suite (which offer TLS-backed client mail services by default), and reap the benefits of uptime assurance and spam-scrubbing being Someone Else's Problem.

Cloud providers should, similarly, steer people away from maintaining their own email infrastructure, and gently encourage customers to investigate the sane and stable alternatives. At the very least, cloud provider documentation should clearly explain the differences between POP and IMAP and why you might not need one or the other, then guide customers toward TLS-wrapped client mail services.

Government cybersecurity agencies should advocate for strong encryption alternatives to the cleartext IMAP and POP protocols, and educate the public on the fact that POP and IMAP are often convenient backdoors to password testing, since they are rarely secured with multi-factor authentication.

Related blog posts