Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Email Security

Email Spoofing

The forgery of email header fields—most commonly the From address—to make a message appear to originate from a sender other than its true source.

Definition

Email spoofing manipulates the RFC 5322 header fields visible to a recipient, typically the From header, to display an arbitrary sender identity regardless of the actual origin of the message. Because the SMTP protocol imposes no inherent authentication on the envelope or header sender, an unauthenticated mail server can claim any From address. Spoofing ranges from exact-domain impersonation to display-name deception, where the From header contains a trusted name paired with an attacker-controlled email address.

Why It Matters

Spoofed emails are the delivery mechanism for phishing, business email compromise (BEC), and malware distribution. Even technically sophisticated recipients are susceptible to display-name spoofing because most email clients show only the display name rather than the full address. BEC attacks exploiting spoofing have resulted in billions of dollars in wire fraud losses annually according to FBI IC3 reporting.

How It Works

The SMTP envelope sender (MAIL FROM) and the RFC 5322 From header are independent fields; an attacker sets the From header to the impersonated address while routing the message through their own infrastructure. SPF validates the envelope sender's domain against authorized sending IPs, DKIM validates a cryptographic signature tied to the signing domain, and DMARC enforces alignment between those authenticated domains and the header From domain. When all three are absent or misconfigured on the target domain, spoofing requires no special access. Even with DMARC enforcement, display-name spoofing (using a legitimate-looking name with an unrelated From address) and cousin-domain spoofing (a look-alike domain with valid authentication records) remain viable attack vectors.

DFIR Platform

Phishing Email Checker

The Phishing Email Checker detects spoofing through SPF, DKIM, and DMARC validation, From/Reply-To mismatch detection, and header anomaly analysis across its 26+ analysis modules.

View Documentation

Related Concepts

SPF (Sender Policy Framework)DKIM (DomainKeys Identified Mail)DMARC (Domain-based Message Authentication, Reporting and Conformance)Phishing AnalysisBusiness Email Compromise (BEC)

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free