{"id":19165,"date":"2023-06-06T10:20:00","date_gmt":"2023-06-06T10:20:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19165"},"modified":"2023-06-06T17:03:38","modified_gmt":"2023-06-06T17:03:38","slug":"how-dmarc-protects-against-ransomware","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/","title":{"rendered":"How DMARC Can Protect Against Phishing &amp; Ransomware"},"content":{"rendered":"\n<p>Organizations adopting the Domain-based Message Authentication, Reporting, and Conformance (DMARC) standard enable the validation and authentication of emails sent from their domain. Servers and security tools receiving email can perform DMARC checks and quickly detect spoofed emails trying to impersonate the organization. Eliminating these spoofed emails can drastically reduce both phishing emails and ransomware attacks.<\/p>\n\n\n\n<p>This article will explore how this works in more detail:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#combination\">Ransomware &amp; Phishing \u2014 a Toxic Combination<\/a><\/li>\n\n\n\n<li><a href=\"#counter\">How DMARC Counters Phishing &amp; Ransomware<\/a><\/li>\n\n\n\n<li><a href=\"#bottom-line\">Bottom Line: Adopt DMARC as an Essential Part of Email Security<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"combination\">Ransomware &amp; Phishing \u2014 a Toxic Combination<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware\/\">Ransomware<\/a> attacks accounted for approximately <a href=\"https:\/\/aag-it.com\/the-latest-ransomware-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">one out of every five<\/a> cyber crimes in 2022 even as the number of ransomware attacks dropped by 23% compared to 2021. However, the impact of ransomware continues to grow as ransoms increase and attackers increase the magnitude of their overall threat with the addition of data exfiltration, extortion, and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-ddos-attacks\/#:~:text=Distributed%20denial%2Dof%2Dservice%20(,that%20resource%20for%20legitimate%20use.\">distributed denial of service<\/a> (DDoS) attacks.<\/p>\n\n\n\n<p>The costs of ransomware attacks can be massive, including downtime, data loss, business reputation damage, recovery expenses, forensic investigation expenses, and significant psychological damages for the teams. Ransomware depends upon phishing for the majority of ransomware attacks, yet phishing also delivers other types of attacks. Phishing, in turn, often depends upon email spoofing to trick users into falling for the phishing attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ransomware Depends on Phishing<\/h3>\n\n\n\n<p>A ransomware attack can spring from a single email, and phishing provides the most common entry point for ransomware. However, in most cases, clicking on a bad phishing link does not launch ransomware. Attacks that do launch immediately can usually only encrypt the computer for the phishing victim, which limits the ransom-earning potential. More insidious, news-worthy, and revenue generating ransomware attacks need widespread access to the organization for maximum impact.<\/p>\n\n\n\n<p>To achieve the broader goal, 63% of phishing attacks seek to compromise credentials. By stealing credentials, the ransomware gang can then infiltrate the network, expand access, and attack the organization as a whole.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Other Phishing-Delivered Attacks<\/h3>\n\n\n\n<p>Although ransomware makes headlines because of their highly disruptive and obvious impact, phishing attacks can deliver a number of other highly harmful attacks such as business email compromise (BEC), credentials harvesting, keyloggers, remote access trojans (RATs), cryptojacking malware, and other spyware. RATs tend to be the malware of choice because they offer the flexibility of future attack options and the hackers can also resell their access to ransomware-as-a-service providers, cryptocurrency mining groups, bot farms, and more.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing Depends on Spoofing<\/h3>\n\n\n\n<p>Spammers send an <a href=\"https:\/\/aag-it.com\/the-latest-phishing-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">estimated 3.4 billion emails<\/a> every day, and Google blocks around 100 million phishing emails daily. Attackers use phishing to perform 47% of the attacks against North and South American organizations, 43% of the attacks against Asian organizations, and 42% of the attacks against European organizations. Microsoft even estimates that <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-email-security\" target=\"_blank\" rel=\"noreferrer noopener\">94% of cyberattacks<\/a> begin with a malicious email.<\/p>\n\n\n\n<p>Yet no one clicks on an unconvincing email. Most people will be tricked by emails that appear to be legitimate and sent by a familiar brand. LinkedIn, Microsoft, Adobe, and Google are top brands used in broad phishing attacks, but smaller brands will also be used in more targeted attacks.<\/p>\n\n\n\n<p>It\u2019s not so difficult to fake an email. Attackers forge the \u201cFrom\u201d address to target victims with a fraudulent, \u201c<a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\">spoofed<\/a>\u201d email that appears to be from a legitimate sender.<\/p>\n\n\n\n<p>For example, perhaps an administrator at the law firm of GenericContracts.com clicks on a phishing link and the attackers scope out the firm. The attackers may find the firm too small to be worth a ransom attack but also realize that the firm does local work for dozens of larger corporations.<\/p>\n\n\n\n<p>The ransomware attackers may choose to spoof the GenericContracts.com domain and send phishing emails to the stolen contact names for those larger corporations with \u201cOverdue Invoice\u201d PDF files laden with malware. With an existing working relationship with GenericContractors.com, the corporate clients are more likely to click on the phishing emails and enable future ransomware attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"counter\">How DMARC Works to Stop Ransomware<\/h2>\n\n\n\n<p>Fortunately, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dmarc\/\">DMARC<\/a> provides a way to stop email using fake \u201cFrom\u201d addresses and reduce spoofing email attacks. DMARC provides email authentication not only to validate official emails but also to invalidate imposter emails by enhancing other email authentication standards.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How Email Authentication Works<\/h3>\n\n\n\n<p>DMARC is published with an organization\u2019s Domain Name Service (DNS) and depends on the prior establishment of two other email authentication standards. The <a href=\"https:\/\/www.esecurityplanet.com\/networks\/sender-policy-framework\/\">Sender Policy Framework<\/a> (SPF) lists all domains authorized to send emails on behalf of the organization. The <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dkim\/\">DomainKeys Identified Mail<\/a> (DKIM) standard enables an organization to digitally sign emails from their domain using public key cryptography to verify that an email is delivered unaltered.<\/p>\n\n\n\n<p>DMARC builds on SPF and DKIM to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check for alignment, or consistency, between the \u201cfrom\u201d field in the body of the email and the SPF and DKIM domains<\/li>\n\n\n\n<li>Instruct the email server how to handle (ignore, quarantine, or discard) emails that fail SPF, DKIM, or DMARC checks<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">DMARC Alignment Example<\/h3>\n\n\n\n<p>Extending the example above, hackers may forge a fake email spoofing the accounts payable department of GenericContracts.com in the \u201cFrom\u201d field of the text the reader can see. However, the email itself will be sent from their own domain of SpammyPhishing.com, which shows up only in the header of the email (normally hidden from the reader).<\/p>\n\n\n\n<p>However, if GenericContract.com deployed an <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/getting-dmarc-right\/\">effective DMARC policy<\/a>, their clients\u2019 email server would perform a DMARC check. The DMARC check would fail the email for being sent from a non-authorized domain and for having misalignment (or non-matching) header and email \u201cFrom\u201d fields. The receiving email server would be notified that the spoofed emails are fraudulent and likely send the impersonating email to the SPAM folder or even discard them.<\/p>\n\n\n\n<p>Additionally, GenericContracts.com would receive a report from their clients\u2019 emails servers that detail the campaign of phishing emails from SpammyPhishing.com. GenericContracts can then proactively warn customers about the phishing attack, search for their data breach, and report SpammyPhishing.com as a malicious URL.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to Use DMARC<\/h3>\n\n\n\n<p>Security specialists recommend using DMARC to help protect against ransomware attacks as an essential <a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-security\/\">email security<\/a> tool. While DMARC primarily protects other organizations receiving emails attempting to impersonate the organization, DMARC makes the task of spoofing emails significantly more complicated for hackers and helps preserve the organization\u2019s brand image.<\/p>\n\n\n\n<p>Of course, it\u2019s not the ultimate protection, as there are many other techniques hackers can deploy. Additionally, organizations need to enforce DMARC on their email receiving servers to perform the DMARC check. However, every protection deployed adds an additional layer of defense, and deploying DMARC also adds other benefits to the organization, such as improving the delivery of marketing emails.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"bottom-line\">Bottom Line: Adopt DMARC as an Essential Part of Email Security<\/h2>\n\n\n\n<p>DMARC can be challenging to <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-set-up-and-implement-dmarc-email-security\">configure correctly<\/a>; however, it provides powerful email protection against spoofing, phishing, and related attacks such as ransomware. Organizations need to adopt DMARC to protect themselves and others against spoofing attacks and to help erode the threat of spam, which accounted for <a href=\"https:\/\/aag-it.com\/the-latest-phishing-statistics\/#:~:text=The%20US%2Dbased%20IC3%20received,than%20%242.7%20billion%20in%202022.\" target=\"_blank\" rel=\"noreferrer noopener\">48% of all emails sent<\/a> in 2022.<\/p>\n\n\n\n<p>For further reading on tools to secure email:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-security\/\">How to Improve Email Security for Enterprises and Businesses<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">9 Best Next-Generation Firewall (NGFW) Solutions for 2023<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/secure-access-service-edge-sase\/\">Top Secure Access Service Edge (SASE) Providers<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\">Top Secure Email Gateway Solutions<\/a><\/li>\n<\/ul>\n\n\n\n<p><em>This article was originally written and published by <a href=\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\">Julien Maury<\/a> on September 21, 2021 and updated by <a href=\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\">Chad Kime<\/a> on June 6, 2023.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6e0404df15-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e0404df15\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e0404df15\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e0404df15\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e0404df15\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e0404df15\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e0404df15\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn how DMARC protects users from ransomware and other threats delivered through email.<\/p>\n","protected":false},"author":271,"featured_media":19167,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[19,15],"tags":[6700,839,2478],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[394,31790],"class_list":["post-19165","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint","category-threats","tag-dmarc","tag-email-security","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_product-email-security","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How DMARC Can Protect Against Phishing &amp; Ransomware<\/title>\n<meta name=\"description\" content=\"Learn how DMARC protects users from ransomware and other threats delivered through email.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How DMARC Can Protect Against Phishing &amp; Ransomware\" \/>\n<meta property=\"og:description\" content=\"Learn how DMARC protects users from ransomware and other threats delivered through email.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-06T10:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-06T17:03:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"710\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"How DMARC Can Protect Against Phishing &amp; Ransomware\",\"datePublished\":\"2023-06-06T10:20:00+00:00\",\"dateModified\":\"2023-06-06T17:03:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/\"},\"wordCount\":1225,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Ransomware.jpg\",\"keywords\":[\"DMARC\",\"email security\",\"ransomware\"],\"articleSection\":[\"Endpoint\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/\",\"name\":\"How DMARC Can Protect Against Phishing & Ransomware\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Ransomware.jpg\",\"datePublished\":\"2023-06-06T10:20:00+00:00\",\"dateModified\":\"2023-06-06T17:03:38+00:00\",\"description\":\"Learn how DMARC protects users from ransomware and other threats delivered through email.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Ransomware.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Ransomware.jpg\",\"width\":710,\"height\":400,\"caption\":\"ransomware prevention\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How DMARC Can Protect Against Phishing &amp; Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How DMARC Can Protect Against Phishing & Ransomware","description":"Learn how DMARC protects users from ransomware and other threats delivered through email.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"How DMARC Can Protect Against Phishing & Ransomware","og_description":"Learn how DMARC protects users from ransomware and other threats delivered through email.","og_url":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/","og_site_name":"eSecurity Planet","article_published_time":"2023-06-06T10:20:00+00:00","article_modified_time":"2023-06-06T17:03:38+00:00","og_image":[{"width":710,"height":400,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Ransomware.jpg","type":"image\/jpeg"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"How DMARC Can Protect Against Phishing &amp; Ransomware","datePublished":"2023-06-06T10:20:00+00:00","dateModified":"2023-06-06T17:03:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/"},"wordCount":1225,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Ransomware.jpg","keywords":["DMARC","email security","ransomware"],"articleSection":["Endpoint","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/","url":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/","name":"How DMARC Can Protect Against Phishing & Ransomware","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Ransomware.jpg","datePublished":"2023-06-06T10:20:00+00:00","dateModified":"2023-06-06T17:03:38+00:00","description":"Learn how DMARC protects users from ransomware and other threats delivered through email.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Ransomware.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/Ransomware.jpg","width":710,"height":400,"caption":"ransomware prevention"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How DMARC Can Protect Against Phishing &amp; Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19165"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19165"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19165\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19167"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19165"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19165"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19165"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}