Skip to main content
New AI-powered DMARC analysis + open REST API See how → →
Foundational 5 min read

Understanding TLS downgrade attacks and how MTA-STS mitigates them

Vasile Diaconu
Vasile Diaconu Operations Lead
Updated April 16, 2026 | Updated for 2026

Quick Answer

_According to the FBI's 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report Understanding TLS downgrade attacks and how MTA-STS mitigates them

Related: Free DMARC Checker ·How to Create an SPF Record ·SPF Record Format

Understanding TLS downgrade attacks and how MTA-STS mitigates them

Try Our Free MTA-STS Checker

Validate the MTA-STS DNS record and policy file for any domain.

Check MTA-STS Policy →

From a product strategy perspective, DMARC reporting is evolving from a security tool to a business intelligence platform, says Brad Slavin, General Manager of DuoCircle. The data in aggregate reports tells you not just who’s spoofing you, but who’s sending legitimate email on your behalf - and whether they’re doing it correctly.

_According to the FBI’s 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report

Understanding TLS downgrade attacks and how MTA-STS mitigates them

					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						

Play Episode

					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						

Pause Episode

					</button>
					


				

				

					<audio preload="none" class="clip clip-15618">
						<source src="https://media.mailhop.org/dmarcreport/images/2024/09/Understanding-TLS-downgrade-attacks-and-how-MTA-STS-mitigates-them.mp3">
					</audio>
					

						

					

					

						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								

Mute/Unmute Episode

							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								

Rewind 10 Seconds

							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								

Fast Forward 30 seconds

							</button>
						

						

							<time class="ssp-timer">00:00</time>
							

/

							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H2M13S">2:13</time>
						

					

				

			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-15618" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-15618" title="Share">Share</button>
										</nav>
						

	



		

						

				

					

					

				

				

					

																																																																								

					

						

RSS Feed

							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-15618" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-15618" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

				

			

									

				

					

					

				

				

					

						Share						

					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/understanding-tls-downgrade-attacks-and-how-mta-sts-mitigates-them/&t=Understanding TLS downgrade attacks and how MTA-STS mitigates them" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/understanding-tls-downgrade-attacks-and-how-mta-sts-mitigates-them/&url=Understanding TLS downgrade attacks and how MTA-STS mitigates them" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2024/09/Understanding-TLS-downgrade-attacks-and-how-MTA-STS-mitigates-them.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

				

				

					

						Link						

					

						<input value="https://dmarcreport.com/blog/podcast/understanding-tls-downgrade-attacks-and-how-mta-sts-mitigates-them/" class="input-link input-link-15618" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-15618" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
				

				

					

						Embed						

					

						<input type="text" value='<blockquote class="wp-embedded-content" data-secret="QHcw6PPjza"><a href="https://dmarcreport.com/blog/podcast/understanding-tls-downgrade-attacks-and-how-mta-sts-mitigates-them/">Understanding TLS downgrade attacks and how MTA-STS mitigates them</a></blockquote><iframe sandbox="allow-scripts" security="restricted" src="https://dmarcreport.com/blog/podcast/understanding-tls-downgrade-attacks-and-how-mta-sts-mitigates-them/embed/#?secret=QHcw6PPjza" width="500" height="350" title=""Understanding TLS downgrade attacks and how MTA-STS mitigates them" - DMARC Report" data-secret="QHcw6PPjza" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"></iframe><script>

/*! This file is auto-generated / !function(d,l){“use strict”;l.querySelector&&d.addEventListener&&“undefined”!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll(‘iframe[data-secret=”‘+t.secret+’”]’),o=l.querySelectorAll(‘blockquote[data-secret=”‘+t.secret+’”]’),c=new RegExp(“^https?:$”,“i”),i=0;i<o.length;i++)o[i].style.display=“none”;for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(“style”),“height”===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):“link”===t.message&&(r=new URL(s.getAttribute(“src”)),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(“message”,d.wp.receiveEmbedMessage,!1),l.addEventListener(“DOMContentLoaded”,function(){for(var e,t,s=l.querySelectorAll(“iframe.wp-embedded-content”),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(“data-secret”))||(t=Math.random().toString(36).substring(2,12),e.src+=”#?secret=“+t,e.setAttribute(“data-secret”,t)),e.contentWindow.postMessage({message:“ready”,secret:t},"")},!1)))}(window,document); //# sourceURL=https://dmarcreport.com/wp-includes/js/wp-embed.min.js ’ title=“Embed Code” class=“input-embed input-embed-15618” readonly/>

					<button class="copy-embed copy-embed-15618" title="Copy Embed Code" aria-label="Copy Embed Code"></button>
				

			

				



It is easier to think that your encrypted email is safe enough to defend against any kind of attack, but the truth is that cybercriminals are getting smarter by every second, and it takes more than simple encryption to secure your email communications. One such attack that puts the integrity of your already **secured emails in jeopardy is the TLS downgrade attack.

In this attack, the threat actor targets vulnerabilities in the previous versions of the Transport Layer Security (TLS) protocol and forces the communication to go back to its outdated, less secure version. Once successful, they intercept the communication and manipulate the data being transmitted.

The good news is that there is a way out of this vicious loop, and it is called Mail Transfer Agent-Strict Transport Security (MTA-STS). MTA-STS is a relatively new standard in the industry that hits the bull’s eye. In this situation, it secures email communications by enforcing the use of the latest and most secure versions of TLS.

Let us take a **deep dive into what TLS downgrade attacks are and how MTA-STS emerges as a brute force against these attacks.

Gmail dmarc

What is a TLS downgrade attack?

SMTP connections are not inherently secure as they allow encryption to be added later with the STARTTLS command. It is the STARTTLS that **upgrades a plain SMTP connection to an encrypted one using TLS, but the command itself is sent in cleartext. This makes it vulnerable to a man-in-the-middle (MITM) attacker who can intercept the communication.

An attacker can leverage this opportunity to tamper with the STARTLLS command by replacing it with a string of meaningless characters. The attacker, very cleverly, replaces the command instead of simply removing it because doing so retains the packet size, making the discrepancies go unnoticed.

The client that doesn’t recognize the tampered command will fail to initiate TLS encryption and will revert to sending the email in plaintext**. This clever tactic and the consequent fallback to unencrypted communication allows the attacker to intercept, read, and possibly alter the email contents without detection.

What we can infer from this is that a downgrade attack is often part of an MITM attack. The attacker forces the connection to roll back to cleartext, **creating a pathway for cryptographic attacks that wouldn’t be possible with the latest TLS versions .

What are some of the notable TLS downgrade attacks?

There have been many instances of TLS downgrade attacks so far, but some of them stand out, given the impact they have caused. These attacks show how attackers can exploit the backward **compatibility and flexibility built into protocols to compromise secure communications.

Dmarc analyzer

DROWN Attack (2016)

This was an attack aimed at servers supporting both SSLv2 and TLS. Attackers downgraded the connection to SSLv2, a much weaker protocol, giving them full reach to decrypt sensitive information_._ In this attack, the attackers tricked the system into using an outdated security method that they could easily break.

POODLE Attack (2014)

The POODLE (Padding Oracle on Downgraded Legacy Encryption) attack is one of the most infamous downgrade attacks. It was executed by forcing a secure TLS connection to fall back to SSL 3.0, which is much less secure. In the POODLE attack, once the connection is downgraded, an attacker needs only about 256 attempts to decrypt a single byte of encrypted information. The vulnerability was so severe that it led to the **widespread deprecation of SSL 3.0 across the internet. The basic SSL expiredissue can cause extensive damage, so you can imagine the impact of such advanced attacks.

FREAK Attack (2015)

This attack exploited a weakness in the way some **SSL/TLS implementations handled ‘export-grade’ cryptographic keys. Attackers forced a downgrade to weaker encryption, allowing them to break the encryption and intercept data.

Dmarc record generator

How does MTA-STS defend against these attacks?

An important thing that you should know is that enforcing TLS is possible for **client-to-server communications because both ends support it, but this is not the case with server-to-server communications. Some servers simply do not support TLS, which makes fallback to plaintext an inevitable consequence. This is where MTA-STS comes in.

Remember the problem of decryption we talked about earlier? MTA-STS ensures that your emails are always encrypted. It allows email servers to indicate that they rely on TLS to establish a secure connection . If a server can’t establish a secure TLS connection, it won’t send the email. This ‘fail close’ approach means that if the encryption negotiation fails, the email isn’t sent at all. This makes it impossible for attackers to force a downgrade to an unencrypted connection, ensuring your emails stay secure.

Create dmarc record

In addition to implementing MTA-STS to safeguard against TLS downgrade attacks, it’s crucial to configure SPF, DKIM, and DMARC for comprehensive email security, **ensuring email authenticity **and protecting your domain from phishing and spoofing threats.

**MTA-STS enhances EXO or Exchange Online email security and compensates for any loopholes in the SMTP connection, such as a lack of support for secure protocols or expired TLS certificates.

This protocol allows you to enforce a policy that mandates the use of TLS for all email communications. If the **recipient server does not support TLS, the email is held back.

Lately, many **mail service providers have adopted MTA-STS, with the aim of making connections between servers more secure and ensuring that the updated versions remain encrypted.

Dmarc check

How to get started with MTA-STS?

With threats like TLS downgrade looming over your digital landscape, you need a defence mechanism that is robust and reliable. As you know, traditional SMTP connections are vulnerable to various attacks, the MTA-STS standard emerges as a critical solution. It enhances email security by enforcing TLS encryption for all email communications, ensuring that emails are always sent over secure connections.

Ready to implement MTA-STS for your domain? Get in touch with experts so that you can establish a secure, **encrypted connection and prevent TLS downgrade attacks.

Use end-to-end support for implementing MTA-STS, ensuring your email communications are always secure.

Vasile Diaconu
Vasile Diaconu

Operations Lead

Operations Lead at DuoCircle. Runs project management, developer coordination, and technical support execution for DMARC Report.

LinkedIn Profile →

Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.