{"id":18823,"date":"2023-05-23T16:20:00","date_gmt":"2023-05-23T16:20:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18823"},"modified":"2023-08-16T21:41:12","modified_gmt":"2023-08-16T21:41:12","slug":"email-spoofing","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/","title":{"rendered":"Email Spoofing: What it Is &#038; How to Prevent It"},"content":{"rendered":"\n<p>Email spoofing forges the sender address on emails to make the email appear to be from a trusted source or brand. Hackers commonly use spoofing in SPAM and phishing attacks to evade email filters and to improve the appearance of legitimacy to the users that receive the emails.&nbsp; To improve protection against spoofing attacks, an organization should understand:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#overview\">What is email spoofing?<\/a><\/li>\n\n\n\n<li><a href=\"#recognition\">How to identify a spoofed email<\/a><\/li>\n\n\n\n<li><a href=\"#prevention\">How to prevent email spoofing<\/a><\/li>\n\n\n\n<li><a href=\"#bottom-line\">Bottom Line: Keep Ahead of the Constantly Evolving Threat of Email Spoofing<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"overview\">What Is Email Spoofing?<\/h2>\n\n\n\n<p>Email spoofing is a hacking technique that forges or manipulates email metadata such asthe display name and email address to mislead the intended recipient about the identity of the email sender. While not all SPAM or phishing attacks use spoofed identities, the use of email spoofing techniques enhances the capabilities of SPAM and phishing emails. Spoofing is often used in conjunction with:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">Social engineering<\/a> phishing attacks pretending to be other employees or associates known to the recipient<\/li>\n\n\n\n<li>Business email compromise (BEC) attacks attempting to commit fraud while impersonating business executives or business partners<\/li>\n\n\n\n<li>Domain impersonation such as changing only one or two letters in a brand name or URL such \u201cArnazon\u201d instead of \u201cAmazon\u201d<\/li>\n<\/ul>\n\n\n\n<p>Phishing, social engineering, and other email based attacks that use stolen credentials to send fraudulent emails from legitimate accounts do not qualify as spoofed emails. The sending domain is not manipulated in those cases and the sender, while compromised, is legitimate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"recognition\">How to Identify a Spoofed Email<\/h2>\n\n\n\n<p>To catch a spoofed email, first read the subject line as well as the sender\u2019s name and email address. Next, open the email and determine whether the footer seems legitimate, then read the body of the email and note any unclear verbiage or grammatical issues. Finally, note whether your email client marked the message as spam, and inspect the email header if needed.<\/p>\n\n\n\n<p>Consider the email in the screenshot below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"598\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2023\/05\/email_spoofing-sample_email.png\" alt=\"Screenshot of a sample of an email spoof.\" class=\"wp-image-30259\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/email_spoofing-sample_email.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/email_spoofing-sample_email-300x175.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/email_spoofing-sample_email-768x449.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/email_spoofing-sample_email-150x88.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/email_spoofing-sample_email-696x406.png 696w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>First, the subject line, sender email address, and footer are all indicators that the email is illegitimate. If it was a real email from Sam\u2019s Club, the subject line should be free of errors and strange formatting. The domain of the sender email address would be <em>samsclub.com<\/em> or some variation thereof instead of <em>blackboardninja.com<\/em>, and the mailing address in the footer would be the Sam\u2019s Club headquarters address instead of an address in Las Vegas.<\/p>\n\n\n\n<p>Additionally, the body content of the email has a vague call to action\u2014what is the \u201cLoyalty Program\u201d and what must one do to earn the so-called \u201cprize\u201d? Unless the recipient is expecting an email like this, there is very little context that indicates where the link leads. This is typical of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">phishing emails<\/a>.<\/p>\n\n\n\n<p>Finally, the fact that Gmail automatically categorized this email as Spam doesn\u2019t necessarily mean it\u2019s a spoof, but it\u2019s definitely a red flag. Spam filters can be overzealous at times, which is why important emails like order confirmations and shipping updates sometimes end up in the wrong folder. However, the purpose of a spam filter is to prevent gullible recipients from falling into a spoofed email\u2019s traps.<\/p>\n\n\n\n<p>Not all spoofed emails will be so easily recognizable. Others may require an inspection of the email header to check for discrepancies between the supposed sender and the actual sending domain.<\/p>\n\n\n\n<p>Keep in mind that most email programs do not verify or perform authentication checks on the identifying fields within the body of the email such as Mail From, Reply To, From, Subject, Date, or To. An attacker can claim to be one identity in the From field and a different identity in the header and it will be difficult for the user to notice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"prevention\">How to Prevent Email Spoofing<\/h2>\n\n\n\n<p>Email spoofing, often used in conjunction with phishing attacks, threatens organizations of all sizes. Common security techniques such as encryption, firewalls, and antimalware software cannot stop spoofed emails from being delivered to an inbox or help a user that clicks on a phishing link to harvest credentials.<\/p>\n\n\n\n<p>Although email spoofing techniques are becoming more sophisticated with each passing day, there are a few tactics that can help prevent a successful email spoofing attack. These include email authentication protocols, email security tools, email server settings, secure email gateways, and regular employee training.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Email Authentication Protocols<\/h3>\n\n\n\n<p>Protocols exist to help authenticate email senders to reduce the effectiveness of spoofing. The <a href=\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\">Sender Policy Framework<\/a> (SPF), <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dkim\/\">Domain Keys Identified Email<\/a> (DKIM), and <a href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-dmarc\/\">Domain-based Message Authentication, Reporting, and Conformance<\/a> (DMARC) protocols provide effective defense through public posting of company email server information in the domain name services (DNS) records and servers. Together, these protocols reduce the ability of an attacker to spoof an organization\u2019s domain from being used for malicious purposes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Email Security Tools<\/h3>\n\n\n\n<p>Many vendors offer <a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-security\/\">email security<\/a> tools that specifically guard against spoofing, spam emails, and phishing attacks. These tools use threat feeds, artificial intelligence\u2013enhanced algorithms, and other features to detect, block, quarantine, or flag suspicious emails. These tools can be delivered in various ways such as appliances, on-premises software, or cloud-based software-as-a-service solutions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Email Server Settings<\/h3>\n\n\n\n<p>Many email servers default for more permissive delivery of suspicious emails to prevent missing emails from customers and vendors. However, given the onslaught of phishing attacks, an organization may wish to adjust email server settings to be more strict. For example, when an email fails email authentication checks (SPF, DKIM, DMARC), instead of allowing the email to be delivered to a SPAM folder or delivered to an inbox with a \u2018suspicious\u2019 flag, simply discard the email.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secure Email Gateways<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\">Secure Email Gateway solutions<\/a> provide advanced email filtering and protection capabilities such as email authentication checks (using SPF, DKIM, DMARC), reverse DNS lookups, active scanning of emails for malicious files, and robust tracking tools for security teams to investigate specific emails. Secure email gateways can be deployed locally, in the cloud, or obtained as a service. These tools can not only protect local email servers, but also web-based services such as Outlook 365 and GMail.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Employee Training<\/h3>\n\n\n\n<p>As with most cybersecurity and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network security<\/a> efforts, <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">employee training<\/a> helps create a safeguard against attacks that are able to slip past technical defenses. Organizations should set aside time at least once per year (if not more frequently) to teach employees what to look for in a legitimate email as opposed to a spoofed one. Then, perform follow up tests to see who may still fall victim to a spoofing attack. This will help ensure everyone on a team can act appropriately when a spoofed email inevitably lands in their inbox.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"bottom-line\">Bottom Line: Keep Ahead of the Constantly Evolving Threat of Email Spoofing<\/h2>\n\n\n\n<p>As long as an organization uses email to communicate internally and externally, email spoofing will be a threat. In fact, email spoofing accounted for more than $216 million in losses in 2020 alone, according to the FBI\u2019s IC3 <a href=\"https:\/\/www.fbi.gov\/trends\/\/pressrel\/press-releases\/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics\" target=\"_blank\" rel=\"noreferrer noopener\"><em>2020 Internet Crime Report<\/em><\/a>. However, while spoofed emails may look different from one day to the next, applying available solutions can dramatically reduce exposure to receiving spoofed emails as well as prevent an organization\u2019s brand from being used in spoofed email attacks.<\/p>\n\n\n\n<p><em>This article was originally written and published by <a href=\"https:\/\/www.esecurityplanet.com\/author\/kaiti-norton\/\">Kaiti Norton<\/a> on July 13, 2021 and updated by <a href=\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\">Chad Kime<\/a> on May 23, 2023.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f825b1758-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f825b1758\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f825b1758\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f825b1758\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f825b1758\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f825b1758\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f825b1758\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn what email spoofing is, how it works, and key email security techniques and tools to block it.<\/p>\n","protected":false},"author":271,"featured_media":18824,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[9651],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[394],"class_list":["post-18823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-faq","b2b_audience-awareness-and-consideration","b2b_product-email-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Email Spoofing: Identification &amp; Protection From Deceptive Senders<\/title>\n<meta name=\"description\" content=\"Learn what email spoofing is, how it works, and key email security techniques and tools to block it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Spoofing: Identification &amp; Protection From Deceptive Senders\" \/>\n<meta property=\"og:description\" content=\"Learn what email spoofing is, how it works, and key email security techniques and tools to block it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-23T16:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T21:41:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Email Spoofing: What it Is &#038; How to Prevent It\",\"datePublished\":\"2023-05-23T16:20:00+00:00\",\"dateModified\":\"2023-08-16T21:41:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\"},\"wordCount\":1217,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg\",\"keywords\":[\"FAQ\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\",\"name\":\"Email Spoofing: Identification & Protection From Deceptive Senders\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg\",\"datePublished\":\"2023-05-23T16:20:00+00:00\",\"dateModified\":\"2023-08-16T21:41:12+00:00\",\"description\":\"Learn what email spoofing is, how it works, and key email security techniques and tools to block it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg\",\"width\":1400,\"height\":933,\"caption\":\"Business person reading emails on smartphone and laptop computer screen. Meant to symbolize the threat of email spoofing.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email Spoofing: What it Is &#038; How to Prevent It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Email Spoofing: Identification & Protection From Deceptive Senders","description":"Learn what email spoofing is, how it works, and key email security techniques and tools to block it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/","og_locale":"en_US","og_type":"article","og_title":"Email Spoofing: Identification & Protection From Deceptive Senders","og_description":"Learn what email spoofing is, how it works, and key email security techniques and tools to block it.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/","og_site_name":"eSecurity Planet","article_published_time":"2023-05-23T16:20:00+00:00","article_modified_time":"2023-08-16T21:41:12+00:00","og_image":[{"width":1400,"height":933,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg","type":"image\/jpeg"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Email Spoofing: What it Is &#038; How to Prevent It","datePublished":"2023-05-23T16:20:00+00:00","dateModified":"2023-08-16T21:41:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/"},"wordCount":1217,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg","keywords":["FAQ"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/","url":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/","name":"Email Spoofing: Identification & Protection From Deceptive Senders","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg","datePublished":"2023-05-23T16:20:00+00:00","dateModified":"2023-08-16T21:41:12+00:00","description":"Learn what email spoofing is, how it works, and key email security techniques and tools to block it.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/email-spoofing.jpeg","width":1400,"height":933,"caption":"Business person reading emails on smartphone and laptop computer screen. Meant to symbolize the threat of email spoofing."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Email Spoofing: What it Is &#038; How to Prevent It"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18823"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18823"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18823\/revisions"}],"predecessor-version":[{"id":31493,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18823\/revisions\/31493"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18824"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18823"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18823"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18823"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}