Email Spoofing: How to Detect and Prevent It
Email spoofing lets criminals send messages that appear to come from your domain or a trusted contact. DMARC enforcement, DKIM signing and SPF records are the technical controls that stop your domain being weaponised against your customers and staff.
Nathan Hill-Haimes
Technical Director
What is email spoofing?
Email spoofing is the practice of forging the sender address of an email to make it appear to have come from a different domain or individual. The from field in an email — the part that displays in your inbox — is simply a piece of text included in the message, not an authenticated claim. Without countermeasures, anyone can set this field to any value they choose.
For businesses, spoofing takes two forms. Inbound spoofing is when criminals send emails to your staff that falsely claim to come from trusted sources — HMRC, your bank, a known supplier, or even your own CEO. Outbound spoofing is when criminals use your domain in emails they send to others — your customers, suppliers or the general public — to give their phishing campaigns the credibility of your brand.
Both forms are damaging: inbound spoofing deceives your employees, while outbound spoofing of your domain damages your reputation and harms your customers.
How email spoofing works technically
SMTP, the protocol that transmits email, was designed in an era when trust between mail servers was assumed. The original protocol includes an EHLO/MAIL FROM command — the sending server identifies itself and the sender address — but there was no mechanism to verify these claims. Modern email clients display the From header address, not the MAIL FROM (sometimes called the envelope sender), which creates further opportunities for misdirection.
Criminals exploit this by registering their own mail servers and setting the From header to impersonate legitimate domains. Basic spam filters may catch obvious cases, but without authentication protocols specifically designed to address spoofing, many fraudulent emails reach inboxes.
SPF: authorising your sending sources
Sender Policy Framework (SPF) allows a domain owner to publish a DNS record listing the IP addresses and mail services authorised to send email on behalf of that domain. When a receiving server processes an inbound email claiming to be from your domain, it checks the sending IP against your SPF record.
A common SPF misconfiguration is having an incomplete record that does not include all legitimate sending services — cloud CRM platforms, marketing automation tools, transactional email services and helpdesk systems all send email on behalf of the business and must be included. An SPF record with a hard fail qualifier (~all vs -all) also affects how strictly receiving servers act on failures.
DKIM: cryptographic proof of authenticity
DKIM adds a digital signature to every outbound email using a private key held by your mail server. The corresponding public key is published in your DNS. Receiving servers can verify the signature, confirming both that the email originated from an authorised source and that the message content was not altered in transit.
DKIM is effective even when email passes through forwarding intermediaries, as long as the message content is not modified. Without DKIM, an attacker who compromises the delivery path between sender and recipient could modify message content undetected.
DMARC: the enforcement layer
DMARC (Domain-based Message Authentication, Reporting and Conformance) is the protocol that puts SPF and DKIM to work. A DMARC record in your DNS tells receiving mail servers what to do when an email claiming to be from your domain fails SPF or DKIM checks:
- p=none: Take no action, but send reports (monitoring mode)
- p=quarantine: Deliver to spam/junk folder
- p=reject: Refuse delivery entirely
A DMARC policy of p=reject is the strongest protection against domain spoofing — emails that fail authentication are refused delivery at the receiving server, preventing them reaching recipients. However, moving directly to p=reject without first auditing your legitimate sending sources risks blocking genuine email.
The recommended approach: deploy DMARC with p=none and set up a DMARC reporting inbox or service. DMARC aggregate reports (RUA) show you every source sending email from your domain and their authentication pass/fail rates. Once all legitimate sources pass SPF and DKIM, advance to p=quarantine for several weeks, review reports for false positives, then move to p=reject.
Lookalike domain attacks: beyond DMARC
DMARC protects your exact domain but cannot prevent criminals registering lookalike domains — amvla.co.uk instead of amvia.co.uk, for example — and sending email from those. Lookalike domains pass DMARC checks because they have their own authentication records.
Countermeasures include: registering common typo variants of your domain defensively; using a domain monitoring service that alerts you when lookalike domains are registered; and training staff to inspect sender addresses carefully. Some email security gateways include lookalike domain detection that flags emails from domains that closely resemble your own or other specified trusted domains.
AMVIA configures SPF, DKIM and DMARC for UK businesses and manages the progression from monitoring through to full rejection policy, ensuring legitimate email continues to flow whilst fraudulent use of your domain is blocked.
Is Your Domain Protected Against Spoofing?
Check whether your domain's SPF, DKIM and DMARC are correctly configured — and find out if your domain is already being used in phishing campaigns without your knowledge.
Frequently Asked Questions
Yes. Without DMARC enforcement at p=reject, anyone can configure a mail server to send emails with a From header showing your domain. They do not need access to your systems — they simply exploit the lack of authentication enforcement at receiving mail servers. DMARC p=reject is the control that prevents this.
DMARC aggregate reports (RUA) sent to a monitoring inbox or service will show you all sources sending email claiming to come from your domain. Some sources will be legitimate (your own systems), others may be spoofing attempts. Tools such as DMARC Analyzer, Postmark, and Valimail parse these reports into readable dashboards. Without DMARC monitoring, you have no visibility into spoofing activity.
Email headers contain technical metadata about the path an email took from sender to recipient, including the originating IP address, mail server relay chain, and authentication results. Examining headers reveals whether an email actually originated from where it claims. Most email clients include a 'View source' or 'Show original' option that displays full headers.
Jumping straight to DMARC p=reject without first auditing sending sources can block legitimate email. The safe approach is to deploy DMARC in monitoring mode (p=none) first, review aggregate reports to identify all legitimate sending sources, ensure they all pass SPF and DKIM, then advance gradually to quarantine and then reject. This process typically takes 4-8 weeks.
No. DMARC protects your exact domain but does nothing to prevent criminals registering amvla.co.uk and spoofing from that. Protecting against lookalike domain attacks requires a combination of defensive domain registration, domain monitoring services, and email gateway capabilities that detect near-match domain impersonation.
DMARC forensic reports (RUF) are full copies of individual emails that fail DMARC checks, sent to the address specified in your DMARC record. They provide detailed evidence of spoofing attempts using your domain. Note that many receiving servers do not send forensic reports due to privacy concerns, so RUF data is often incomplete. Aggregate reports (RUA) are more universally supported.
Related Reading
What Is DMARC?
A complete explanation of the DMARC protocol, how it works and how to implement it step by step.
What Is DKIM?
How DKIM's cryptographic signing prevents email tampering and domain impersonation.
Email Phishing: Keeping Your Business Safe
How spoofing and phishing work together and what you can do to protect your staff and customers.