A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the attacker sensitive data.
The ACCC’s Scamwatch reveals that Australians reported over $4.7 million in losses caused by impersonation attacks in 2017, and estimates that 2,800 Australians were tricked into giving up personal information. In the same year, Mimecast reported that impersonation attacks were the fastest growing email-based cyber attack causing victims to lose on average $180,000. The good news is that you or your IT staff can take some simple (and free) measures to protect your business from email-based impersonation attacks. This article explains why and how.
Email spoofing is when an attacker (cybercriminal) forges an email so that it appears the email has been sent by someone else. This is either done so that the entire name and email address of the sender is a forgery, or in more straightforward cases, just the name of the sender.
The typical intention of the attacker is tricking their victims into:
- making money transfers, or paying fake invoices to defraud your business;
- sending back sensitive data related to your business or your clients;
- clicking on hyperlinks to take over the victims computer and/or steal user credentials to facilitate fraud in what is called a BEC (Business Email Compromise) attack; or
- opening a file attachment to install ransomware on the victim’s computer to encrypt all files on the victim's internal network and hold them for a ransom.
Email Is an Insecure Service by Default
The core email protocols were developed in the 1980s when abuse was not an issue like it is today. Back then, the internet was a quaint and friendly place. Email servers were explicitly configured as open relays meaning they allowed anyone connecting to them to send emails to anywhere. This common practice was abandoned years later when spammers and criminals began exploiting open relays.
This legacy of permissive design in email protocols why email spoofing is quite simple to do. Email services by default are not capable of identifying and blocking deceptive emails with a forged sender name or email address, which leaves businesses vulnerable to impersonation cyber attacks.
For example, the following email was intercepted by our anti-phishing services. The attacker was attempting to scam our client by tricking them into making a financial transfer to their bank account. Interestingly, the criminal knew which employee in the business was responsible for managing payments, and targeted her specifically.
The Mechanisms of Spoofed Emails
There are two common impersonation methods frequently used by cybercriminals. For illustrative purposes, let us say our person in a position of authority we wish to impersonate is Saul Goodman
, and his email address is saul.goodman@sgassociates.com
:
- Method #1 – Email Address Spoofing: Saul’s email address and his name are spoofed on an incoming email so that the sender appears to be:
Saul Goodman <saul.goodman@sgassociates.com>
. - Method #2 – Display Name Spoofing: Only Saul’s name is spoofed, but not the email address:
Saul Goodman <saul.goodman1337@gmail.com>
.
With the availability of web-based free email, Method #2 is a very simple and low-tech attack to carry out. An attacker finds out the name of a person in your business who is in a position of authority and then signs up to a free email service such as Gmail, Outlook.com or Yahoo Mail using their name. The attacker then uses publicly available information on your business from sources such as LinkedIn, or your business website to target people in your organisation.
On the positive side, your IT staff can make a few simple changes to your email service to protect your business from both Method #1 and #2 above.
The following two sections feature detailed instructions which make changes to your mail service so that your business can help identify and block spoofed emails and help prevent impersonation attacks. The instructions are written with a technical audience in mind. If this is not you, we recommend you send this article to your IT staff, or contractor responsible for your email service and ask them to implement the changes below.
If you do not have a reliable person to that can make these changes, then you should get in touch with us, and we can provide you with local, secure email services with these features enabled. Our services also utilise the latest anti-phishing technology and are very competitively priced.
Did you know that every email has two different senders? One email address is called the 'envelope sender', and the other is set in the email header. The latter is known as the 'From:' header, which is normally displayed by the email clients, like Microsoft Outlook. Unfortunately, cybercriminals can forge the 'From:' header to trick email clients into displaying a name and email address which belong to your business.
You or your IT staff can make changes to your email service settings to help block deceptive emails coming into your organisation, and put other email services on notice as to what a legitimate email coming from you should look like. This is done by adding what is known as SPF, DKIM and DMARC DNS records to your company’s domain name.
The Three DNS Records That Combat Email Address Spoofing
Adding SPF, DKIM and DMARC to a business's domain name record is not as complicated as it sounds. In cases where your business uses Office 365 or G Suite you only need to follow the instructions set out below for your mail provider.
Creating an SPF record:
Creating a DKIM record:
Remember what we said about email having email sender addresses? We have yet to create one final record: DMARC. Contrary to popular belief, SPF alone cannot prevent spoofing. Without the DMARC record, cybercriminals can still forge the email address of your business as SPF is only verified against the invisible 'envelope sender', but not the 'From:' header. In other words, the criminals can spoof the sender’s email address, and it will still pass the SPF checks – and this is why you need the DMARC record.
You can use an online DMARC generator to craft the perfect DMARC record for your organisation, or you can just take our word for it and add the following DNS record to your company’s DNS. It is by no means perfect, but it is a great start:
_dmarc.mycompany.com.au. 3600 IN TXT "v=DMARC1; p=quarantine; pct=100;"
Congratulations, time to reward yourself with a nice cup of tea. If you have created all three records, emails from your domain with a forged sender will go straight into peoples junk email folder from now on. That is for your own email service, and any other email service which use DMARC. If you want to be harsher about how to treat emails with forged senders, then you should investigate setting DMARC to 'p=reject'.
Although Display Name Spoofing is a less sophisticated technique than email spoofing, it is much more dangerous. Because the sender’s email address is not forged per se, it is more difficult to block emails with forged display names as opposed to the first scenario, where the mere addition of three simple DNS records was sufficient to stop spoofed emails.
With Method #2 cybercriminals simply register a new email address with a free email provider using the same name as an executive from your organisation (e.g. Saul Goodman <saul.goodman1337@gmail.com>
). Technically, the email address is valid, so emails sent from these accounts will slip through anti-spam filtering. Similarly, the SPF/DKIM/DMARC records will not block these phishing emails either, because the email address is not forged.
As a result, the first and last line of defence is your employees. They need to be vigilant and be prepared to identify emails using the Display Name Spoofing technique. Sadly, this is prone to human error as your employees may not verify the full details of every single incoming email under certain circumstances – like in stressful situations such as fast-approaching deadlines or lack of attention to detail.
Also, employees may believe that because the email looks like it has come from someone they are familiar with and with the standard company email signature signoff from that person, that the email is legitimate. Unfortunately, attackers can also use the same email signatures at the bottom of emails sign-offs as legitimate senders.
To add insult to injury, many email clients – especially smartphone email clients – only display the sender’s name by default, but not the email address. For example, the Mail app on the iPhone requires you to tap on the sender’s name to reveal an email address.
Employees should be trained to identify deceptive emails with the forged display names and should receive as many visual aids as possible to detect if something is off. Luckily, Office 365 and G Suite can be configured to help combat display name spoofing by providing employees with visual clues.
If you are not providing your employees with training to identifying deceptive emails then your organisation is at risk of becoming a victim of phishing. Iron Bastion can provide Phishing Awareness Training for your business. Our service provides effective, hands-on and measurable training for your employees at very competitive pricing.
Adding Visual Clues to External Email in Office 365
With Office 365, we can inject highly-visible warning banners at the top of messages if they were sent from an email address external to your business. The aim is to provide a visual warning to your employees when an email was not sent from someone within your organisation.
To turn the warning banners on, visit the Office 365 Exchange Admin Center on https://outlook.office365.com/ecp, and navigate to mail flow -> rules.
Click on the ‘+’ sign then select ‘Create a new rule...’. In the popup window, choose ‘The sender is located’: ‘Outside the organization’, and ‘The recipient is located’: ‘Inside the organization’. Under the ‘Do the following’, choose ‘Apply a disclaimer to the message’ -> ‘prepend a disclaimer’ and insert the following piece of code:
<div style="background-color:pink; border:0px dotted #003333; padding:.2em; "> <span style="font-size:12pt; font-family: sans-serif; color:black; font-weight:bold; padding:.2em">Please be cautious</span><div style="font-size:10pt; font-family: sans-serif; color:black; font-weight:normal; padding:.2em">This email was sent outside of your organisation</div> </div><hr>
The fallback action should be ‘Wrap’. Click on ‘Save’ and wait for a few minutes for the rule to activate.
G Suite Settings for Flagging External Emails
Although G Suite too can inject highly-visible warning banners like Office 365, the service offers a somewhat more sophisticated technique to combat Display Name Spoofing.
The first setting we recommend is turning on is the external recipient reply warning. This option adds a warning at the top of an email in the Gmail web interface if we attempt to reply to a message from someone outside of our organisation.
A more exciting feature though is one of the new G Suite anti-phishing and malware settings that Google has rolled out recently. This feature can display warning banners against emails that try to spoof employee names, or come from a domain that looks similar to your business’s domain name.
To turn on this setting, go to the G Suite Admin Portal (https://admin.google.com/) and navigate to Apps -> G Suite -> Gmail. Then scroll down to the Safety section and expand it. Go to the Spoofing and authentication section and turn on the followings:
- Protect against domain spoofing based on similar domain names
- Protect against spoofing of employee names
- Protect against inbound emails spoofing your domain (covers the first scenario)
Keep in mind that warning banners will only appear when using the webmail interface. Your employees will not receive any visual clues if they are accessing their mailbox with a classic email client such as Microsoft Outlook. Hence we recommend altering the subject line of the incoming emails as well in case emails are sent from the outside of your organisation.
To change the subject lines of incoming emails, go to Apps -> G Suite -> Gmail -> Advanced Settings on the Admin Portal again. Scroll down to Routing and add a new entry as the following. Choose ‘Incoming’ under ‘Messages to affect’. Pick ‘Only affect specific envelope senders’ and select ‘Pattern match’ from the drop-down menu. Enter ^(?i)(.+@yourdomain\.com.\.au)$
into the regexp field.
Finally, scroll down near the bottom and pick ‘Prepend custom subject’ to add your preferred warning label, then click Save.
Voilá! The subject line of the external emails will now feature a warning prefix.
The third option to combat impersonation attacks (both Email Address Spoofing and Display Name Spoofing) is pre-screening your incoming emails using anti-phishing services. These services feature technologies that are specifically designed to protect organisations from phishing threats including Email Address Spoofing and Display Name Spoofing attacks.
Why Anti-Phishing Services Are Superior
Anti-phishing services can meticulously analyse the entire content of the inbound emails looking for any red flag indicating a phishing attempt, such as typical wording and text semantics, invalid digital signatures, and poor sender reputation. The built-in anti-phishing algorithms are supported by Machine Learning, Artificial Intelligence (AI) and Threat Intelligence Networks. Secondly, file attachments are also analysed in safe environments for known and unknown threats, and embedded hyperlinks are modified to perform real-time analysis (and block) any malicious URL when the recipient clicks on them.
Anti-phishing services are compatible with all email service providers. No matter if your firm is using G Suite, Office 365, on-premise Microsoft Exchange or an email platform provided by your IT service provider, anti-phishing services can seamlessly integrate with any of them. If you are interested in the types of anti-phishing services the top 100 law firms are using in Australia, please refer to our research article on the subject.
Email Address Spoofing and Sender Name Spoofing are techniques that cybercriminals rely on in email-based impersonation attacks. The goal of these scams is to deceive personnel in an organisation and trick them into making payments or sending sensitive information to an attacker. Due to the design decisions made in the 1980s, email cannot guarantee the authenticity of the sender. Various practices are used by criminals to falsify the sender of a message, and each of these email threats needs to be dealt with differently. While a simple change to a business's DNS to include SPF, DKIM and DMARC records can combat Email Address Spoofing attempts, Display Name Spoofing attacks require you to train employees to be more vigilant. Visual clues can be added to incoming emails to warn employees when an email has not come from someone internally. In addition, anti-phishing services can screen emails for phishing using advanced technologies to minimise your organisation's risk of becoming a phishing victim.
Iron Bastion are Australia’s anti-phishing experts. We offer all businesses the same anti-phishing technology used by big businesses, without the big-business pricing.
We offer a range of anti-phishing services which are cloud-based, fully managed and easily integrate with your existing infrastructure. Our team are qualified cybersecurity professionals, and all our staff and operations are based in Australia.
Contact us for a free consultation.
FAQs
Can someone impersonate my email address? ›
Email spoofing is possible due to the way email systems are designed. Outgoing messages are assigned a sender address by the client application; outgoing email servers have no way to tell whether the sender address is legitimate or spoofed.
Can hackers impersonate your email address? ›Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust. In spoofing attacks, the sender forges email headers so that client software displays the fraudulent sender address, which most users take at face value.
How do I report a fake email pretending to be me? ›Report Online and International Scams
Report fake websites, emails, malware, and other internet scams to the Internet Crime Complaint Center (IC3). Some online scams start outside the United States. If you have been affected by an international scam, report it through econsumer.gov.
Phishing schemes often use spoofing techniques to lure you in and get you to take the bait. These scams are designed to trick you into giving information to criminals that they shouldn't have access to.
What is the difference between impersonation and spoofing? ›Spoofing is when the sender is attempting to send mail from, or on behalf of, the exact target domain. Impersonation is when the sender if attempting to send mail that is a lookalike, or visually similar, to a targeted domain, targeted user, or targeted brand.
Was my email hacked or spoofed? ›If you think something is not right, check your sent mail folder to see if there are messages there that you didn't send. If you do find some, then you know a hacker probably has access to your account. Another sign to look out for is for password reset emails that come from other websites and which you didn't request.
Can someone hack your email without a password? ›As Garry Brownrigg, CEO & Founder of QuickSilk, explains, “They can 'spoof' an email message with a forged sender address – they don't even need your password for this.” The things they send can be anything from harmful malware to scams and requests for money; either way, you'd certainly rather they didn't come from ...
How did my email get spoofed? ›Exposed email addresses can easily be acquired by cybercriminals, from compromised mailing lists, public message boards and even company websites. Email spoofing takes place when a message's identifying fields are modified so the email appears to originate from an individual other than the real sender.
What happens if a scammer has your email address? ›What will scammers do with your email address? Once a scammer gets your email address, they'll use it to benefit themselves in any way possible. Many will send you spam email, with the hope of collecting private information such as credit card numbers.
How do I report an impersonator in Gmail? ›If somebody is attempting to impersonate you using a Gmail account, Google suggests you file a report with the Internet Crime Complaint Center (see Resources) and contact your state's Office of Consumer Protection in addition to making a report.
How do I stop spam emails permanently? ›
- Report the email as spam.
- Block spam email addresses.
- Change your email privacy settings.
- Unsubscribe from unwanted newsletters or mailing lists.
- Use a secondary email address.
- Use a third-party email filter.
- Delete suspicious emails.
- Protect your device against malicious spam.
Report abuse by a Gmail user who is violating these agreements, at your domain or another domain, to Google. Send a message to abuse@ or postmaster@, using the domain where the abuse is happening.
What is an example of email spoofing? ›Here's the difference: In an email spoofing attack, the sender's email address looks identical to the genuine email address (jeff.bezos@amazon.com). In a domain impersonation attack, the fraudster uses an email address that is very similar to another email address (jeff.bezos@amaz0n.co).
How do I report an email impersonation? ›Report it. Report the scam to local law enforcement, the FBI's Internet Complaint Crimes Center at IC3.gov, and the FTC at FTC.gov/Complaint.
Can you block spoofed emails? ›Go to Inbound Protection > Blocked Senders. Add all your known spoofed senders or any sender you want to be blocked. A sender can be a specific email address or all senders from a domain.
What causes impersonation? ›There are many reasons for impersonating someone: Entertainment: An entertainer impersonates a celebrity, generally for entertainment, and makes fun of their personal lives, recent scandals and known behavior patterns.
How does impersonation work? ›Impersonation enables a caller to impersonate a given user account. This enables the caller to perform operations by using the permissions that are associated with the impersonated account, instead of the permissions that are associated with the caller's account.
What is impersonation protection? ›Impersonation Protection policies allow you to control: What messages to protect. The identifiers used to detect phishing, whaling, impersonation, and socially engineered phishing attacks. The action taken if one or more of the identifiers are triggered.
What are the first signs of being hacked? ›- You get a ransomware message.
- You get a fake antivirus message.
- You have unwanted browser toolbars.
- Your internet searches are redirected.
- You see frequent, random popups.
- Your friends receive social media invitations from you that you didn't send.
- Your online password isn't working.
Some common signs that your email has been hacked include: Emails in your sent and inbox that you don't recognize. The password has been changed, locking you out. Friends complaining of spam coming from your email address.
How can I tell if someone is using my email? ›
- A changed password.
- Strange emails in your sent folder.
- Unexpected password reset emails.
- Complaints from contacts.
- Unusual IP addresses, devices, and/or browsers.
- Change your password.
- Add two-factor authentication.
- Set up a new account.
The most common way email gets hacked are through phishing schemes. Phishing is the most widely used technique because it's simple, affordable, and attacks the weakest link in any security system – people.
Can someone read my emails without me knowing? ›Can someone read my emails without me knowing? Anyone with access to your device with your mailing account logged in can read your emails without you knowing. An intruder may open and read your email and mark them unread. They can also delete your emails after reading them.
What can a scammer do with my email address and phone number? ›Once they have your number, the bad guys can clean out your financial accounts, confiscate your email, delete your data and take over your social media profiles.
What can a hacker do with your email? ›The goal could be to get these email contacts to send money, turn over personal information, or click a link that installs malware, spyware, or a virus on a device. An email hack could also put your colleagues, friends, and family members in your email contacts list at risk for getting scammed too.
Is email spoofing a cyber crime? ›Email spoofing happens when the cyber criminal uses a fake email address to commit a malicious act. The criminal may spoof the email address, email sender's name, or both, depending on the email spoofing tactic. Additionally, the cyber criminal can assume multiple identities: the sender, the company, or both.
What can someone do with your email address? ›- They Can Impersonate You. ...
- They Can Crack the Passwords on Your Other Accounts. ...
- They Can Use It to Crack Email-Based Two-Factor Authentication (2FA) ...
- They Can Collect Sensitive Information. ...
- They Can Steal Your Identity.
Having access to a primary email can lead to domino-effect hacking of all the accounts that email is linked to – from your Facebook account to your mobile carrier account, paving the way for a depth of identity theft that would seriously compromise your credit. “This is a big risk.
How do I contact Google to report abuse? ›If you have a non-registry related spam issue to report, our mailing address is “ATTN: Abuse Support Team, Google Registry, P.O. Box 1674, Mountain View, CA 94042, USA”, and our email address is registry-abuse-support@google.com. Enter a name. Enter a valid email.
How do you report something to Google? ›- On your Android device, open the Google app .
- At the top right, tap your Profile picture or initial Help & feedback. Send Feedback.
- Enter a description of the issue.
- Tap Send .
How do I report a website for impersonating me? ›
If you believe you're a victim of internet fraud or cybercrime, report it to the Internet Crime Complaint Center (IC3). Or, you can use the FBI's online tips form. Your complaint will be forwarded to federal, state, local, or international law enforcement.
Is it better to block or delete spam? ›If you receive any unwanted email, the best approach in almost every case is to delete it immediately. It is often clear from the Subject line that a message is junk, so you may not even need to open the message to read it.
Why am I suddenly getting so many spam emails? ›Spammers buy email addresses from special providers in bulk to add them to their mailing lists. If you've noted a sudden increase in the number of spam emails landing in your account, there's a high chance that your address was part of a list recently sold to one or more scammers.
Why am I getting so much spam all of a sudden 2022 Gmail? ›If you start receiving an increased amount of spam, with junk mail filters enabled, then there might be a problem with the mailbox that your spam emails are usually moved to. You should check that the target mailbox or mail folder isn't full or disabled.
How can I tell if a Google email is real? ›- "Mailed by" header with the domain name, like google.com.
- "Signed by" header with the sending domain.
Federal Trade Commission: Contact the Federal Trade Commission (FTC) at 1-877-FTC-HELP (1-877-382-4357) or use the Online Complaint Assistant to report various types of fraud, including counterfeit checks, lottery or sweepstakes scams, and more.
What are red flags of phishing? ›Look out for: Incorrect (but maybe similar) sender email addresses. Links that don't go to official websites. Spelling or grammar errors, beyond the odd typo, that a legitimate organization wouldn't miss.
What is spoofing and how do you prevent it? ›Spoofing is a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information. Spoofing attacks copy and exploit the identity of your contacts, the look of well-known brands, or the addresses of trusted websites.
How does Gmail prevent spoofing? ›Gmail administrators should set up email authentication to protect their organization's email. Authentication helps prevent messages from your organization from being marked as spam. It also prevents spammers from impersonating your domain or organization in spoofing and phishing emails.
What happens if someone uses your email address? ›If someone can access your Gmail account, they can change your password and lock you out. You can prevent this by using “two-step verification”. With Gmail, this usually means Google will text a code to your mobile phone. This is fine until you don't have a signal or lose your phone.
How do I report an email impersonation? ›
Report it. Report the scam to local law enforcement, the FBI's Internet Complaint Crimes Center at IC3.gov, and the FTC at FTC.gov/Complaint.
What to do if someone impersonates you on Gmail? ›Impersonation. If somebody is attempting to impersonate you using a Gmail account, Google suggests you file a report with the Internet Crime Complaint Center (see Resources) and contact your state's Office of Consumer Protection in addition to making a report.
What is an example of email spoofing? ›For example, a spoofed email may pretend to be from a well-known shopping website, asking the recipient to provide sensitive data, such as a password or credit card number. Alternatively, a spoofed email may include a link that installs malware on the user's device if clicked.
Can someone hack your email without a password? ›As Garry Brownrigg, CEO & Founder of QuickSilk, explains, “They can 'spoof' an email message with a forged sender address – they don't even need your password for this.” The things they send can be anything from harmful malware to scams and requests for money; either way, you'd certainly rather they didn't come from ...
How can I tell if someone is using my email? ›- A changed password.
- Strange emails in your sent folder.
- Unexpected password reset emails.
- Complaints from contacts.
- Unusual IP addresses, devices, and/or browsers.
- Change your password.
- Add two-factor authentication.
- Set up a new account.
The most common way email gets hacked are through phishing schemes. Phishing is the most widely used technique because it's simple, affordable, and attacks the weakest link in any security system – people.
What happens if a scammer has your email address? ›What will scammers do with your email address? Once a scammer gets your email address, they'll use it to benefit themselves in any way possible. Many will send you spam email, with the hope of collecting private information such as credit card numbers.
Can you report a Gmail account impersonation? ›You can report a Gmail user who is violating Gmail policies here.
How do I report a scammer on Gmail? ›Report abuse by a Gmail user who is violating these agreements, at your domain or another domain, to Google. Send a message to abuse@ or postmaster@, using the domain where the abuse is happening.
Is it illegal to send an email pretending to be someone else? ›Whether it's an email account or a social media profile, Duque says it's not illegal to impersonate someone online although it could result in a civil lawsuit. However, if that online account is used to make threats to others, it's possible criminal charges could be filed against the impersonator.
Why am I getting emails with someone else's name? ›
If you get lots of messages addressed to someone else, check if someone accidentally forwards their mail to you. On your computer, open a message that looks like it was sent to you by mistake. Click Show original. If you see "X-Forwarded-For" on the page, someone forwards their Gmail messages to your account.
Why are people getting spam emails with my name? ›Email spoofing is when an attacker (cybercriminal) forges an email so that it appears the email has been sent by someone else. This is either done so that the entire name and email address of the sender is a forgery, or in more straightforward cases, just the name of the sender.
Is email spoofing a cyber crime? ›Email spoofing happens when the cyber criminal uses a fake email address to commit a malicious act. The criminal may spoof the email address, email sender's name, or both, depending on the email spoofing tactic. Additionally, the cyber criminal can assume multiple identities: the sender, the company, or both.
What are red flags of phishing? ›Look out for: Incorrect (but maybe similar) sender email addresses. Links that don't go to official websites. Spelling or grammar errors, beyond the odd typo, that a legitimate organization wouldn't miss.
How does email hijacking work? ›Email hijacking is usually staged through phishing and other social engineering scams, in which attackers deceive victims into revealing their credentials by directing them to bogus login pages or tricking them into installing a keylogger malware, which records the victim's keystrokes and sends it to a remote server ...