{"id":1005,"date":"2019-04-09T23:47:54","date_gmt":"2019-04-10T03:47:54","guid":{"rendered":"https:\/\/www.thexyz.com\/blog\/?p=1005"},"modified":"2022-09-04T10:00:50","modified_gmt":"2022-09-04T14:00:50","slug":"what-is-email-spoofing","status":"publish","type":"post","link":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/","title":{"rendered":"What is email spoofing?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Email spoofing comes from the word <strong>spoof<\/strong>, which is basically another word for <strong>falsified<\/strong>. An email has been spoofed when the sender deliberately alters parts of the email to make the message appear as though the email sender, sends emails as someone else. Usually, a spoofed email address will contain personal information such as the sender\u2019s name or email address, and the body of the message is formatted to appear as if they are from a legitimate source.<\/p>\n<p>A spoofed message can appear to be sent from a coworker, a bank, a family member, or any number of seemingly trustworthy sources. A good spoof is quite convincing and will look like any other email that you would normally receive. This is why email phishing remains one of the leading causes of business email compromises along with social engineering attacks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1222 aligncenter size-full\" src=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/this-is-suspicious7.png\" alt=\"suspicious email warning\" width=\"936\" height=\"77\" srcset=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/this-is-suspicious7.png 936w, https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/this-is-suspicious7-300x25.png 300w, https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/this-is-suspicious7-768x63.png 768w, https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/this-is-suspicious7-610x50.png 610w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/><\/p>\n<div class='et-box et-warning'>\n\t\t\t\t\t<div class='et-box-content'>Warning: If you suspect you have received a fraudulent message DO NOT click any link in the message or enter any information that is requested.<\/div><\/div>\n<h3>What are the reasons why people spoof email?<\/h3>\n<p>An email is usually spoofed as part of a phishing attack or spear-phishing campaign targeted towards specific employees of an organization.<\/p>\n<p>A spoofed email may also be used to dishonestly market an online service or sell you a product that turns out not to be real. The goal of the email is to trick the recipient into making a damaging statement or releasing sensitive information, such as a password through malicious links. If for example, you&#8217;re receiving bounced emails returned to you for messages that you did not send, this could be the result of a spoofing attack on your email service.<\/p>\n<h3><b>How to Identify a spoofed message<\/b><\/h3>\n<p>It is imperative that all email users understand that emails that appear to be sent from colleagues or friends can possibly be forged emails. This is the case when scammers will alter different sections of an email to disguise who the <em>actual<\/em> sender of the message is.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1223 aligncenter size-full\" src=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/sender-discrepancies.png\" alt=\"Sender discrepancies \" width=\"521\" height=\"123\" srcset=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/sender-discrepancies.png 521w, https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/sender-discrepancies-300x71.png 300w\" sizes=\"(max-width: 521px) 100vw, 521px\" \/><\/p>\n<p>When a user receives an email, they may be able to recognize an email spoofing attempt by hovering over the sender&#8217;s email address to see it in fact the expected email address. With some devices or email clients, this level of diligence may not be sufficient to view sender addresses and it will be necessary to open the <a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/205\/How-to-read-and-analyze-email-headers.html\"><strong>email headers<\/strong><\/a> of a message to view data on email protocols and\u00a0<span class=\"items\"><span class=\"item\">email authentication via simple mail transfer protocol (SMTP).<\/span><\/span><\/p>\n<p>Examples of properties with the email that are spoofed:<\/p>\n<p><strong>FROM<\/strong> <a>boss@companyexample.com <\/a>(This will appear to come from a legitimate source on any spoofed message and may make it through spam filters on the receiving server)<\/p>\n<p><strong>REPLY-TO<\/strong> This can also be spoofed, but a lazy scammer will leave the actual <strong>REPLY-TO<\/strong> address. If you see a different sending address here, the email may have been spoofed.<\/p>\n<p><strong>RETURN-PATH<\/strong> This can also be spoofed, but a lazy scammer will leave the actual <strong>RETURN-PATH<\/strong> address. If you see a different sending address here, the email may have been spoofed.<\/p>\n<p><strong>SOURCE IP<\/strong> address or \u201cX-ORIGIN\u201d address. This is typically more difficult to alter but it is possible to alter the IP of the mail server to another <span>internet service<\/span>.<\/p>\n<p>These first three properties can be easily altered by using settings in your Microsoft Outlook, Gmail, Hotmail, or other email software. The fourth property above, IP address, can also be altered, but usually requires more sophisticated user knowledge to make a false IP address convincing on a SMTP server (simple mail transfer protocol).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-973\" src=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/email-spoof-assistant.png\" alt=\"Email spoof example\" width=\"358\" height=\"54\" srcset=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/email-spoof-assistant.png 358w, https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/email-spoof-assistant-300x45.png 300w\" sizes=\"(max-width: 358px) 100vw, 358px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>In this example, it appears that the recipient has received a message from their office assistant, requesting money. The <strong>subject<\/strong> line should alert you immediately that it is in fact a spam email. This user should contact their assistant through another form of communication to confirm that they did not send this message. Next, you will want to discover who actually sent the message by opening the message headers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-974\" src=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/email-spoof-example.png\" alt=\"Pointing out email spoof\" width=\"416\" height=\"65\" srcset=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/email-spoof-example.png 416w, https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/email-spoof-example-300x47.png 300w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>From:<\/strong> field shows the message being sent from <strong>&#8220;Assistant&#8221; <a>assistant@yourdomainexample.com<\/a><\/strong>. However, we can also see that the<\/p>\n<p><strong>REPLY-TO:<\/strong> field lists <em> <a>spoofer@scam.com<\/a><\/em>. That is a clear cut example of a spoofed message. You will want to Blocklist any address you find in the<\/p>\n<p><b>REPLAY<\/b> <strong>RETURN-PATH<\/strong>, and <strong>SOURCE IP<\/strong> field that is not an address\/IP you normally receive mail from. For more information on viewing and understanding email headers, please see <a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/60\/Displaying-and-Hiding-the-Full-Header.html\">View email headers in Webmail.<\/a><\/p>\n<h3 id=\"combat-spoofing\" class=\"ng-scope\">How to fight email spoofing<\/h3>\n<p>Even with strong email security, the first line of defense against this abuse is user education, If a user receives a spoofed message, please advise them to do the following.<\/p>\n<ul>\n<li>Blocklist any address\/IP listed in the <strong>REPLY-TO<\/strong>, <strong>RETURN-PATH<\/strong>, or <strong>SOURCE IP found within the email headers that <\/strong>you have determined to be fraudulent. See <a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/18\/I-need-to-blacklist-a-domain.html\"> Blacklist addresses, domains, and IPs in Webmail<\/a> for instructions.<\/li>\n<li>Immediately <a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/54\/How-To-Change-Your-Webmail-Password.html\">change the password of your email account<\/a> if you or your users provided that information at any point.<\/li>\n<li>Report phishing emails via our <strong><a href=\"https:\/\/www.thexyz.com\/report-abuse\">Report Phishing tool<\/a><\/strong>.<\/li>\n<li>Alert other employees within your business of the potential for spear phishing.<\/li>\n<li>Talk to your email administrator about enabling sender policy framework (<a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/95\/How-to-create-an-SPF-record.html\"><strong>SPF record<\/strong><\/a>), <a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/64\/What-is-DKIM.html\"><strong>DKIM<\/strong> <\/a>and a <a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/118\/Manage-suspicious-emails-with-DMARC-policy.html\"><strong>DMARC policy<\/strong><\/a> on your email domain and email server. This will help ensure only people authorized to send email on your domain, are going through to recipients intended on the outgoing email.<\/li>\n<\/ul>\n<p>Spoofing is possibly the most frustrating abuse issue to deal with, simply put, because domain spoofing cannot be stopped. It doesn&#8217;t matter where you host your email, as all email users are potentially vulnerable to spoof attacks, whether you host email with Thexyz, Office 365, Google Workspace etc.\u00a0\u00a0<\/p>\n<p>Spoofing is similar to hand-writing many letters and signing someone else&#8217;s name to it. This makes tracing or tracking the activity extremely difficult.<\/p>\n<p>If you are an individual and looking to report an abusive email, we recommend <a href=\"https:\/\/www.thexyz.com\/report-abuse.php\">reporting email abuse<\/a>. Our anti-abuse specialists will process the complaint and take the necessary remediation steps. We take email security seriously and are always happy to discuss best practices for avoiding spam.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Email spoofing comes from the word spoof, which is basically another word for falsified. An email has been spoofed when the sender deliberately alters parts of the email to make the message appear as though the email sender, sends emails as someone else. Usually, a spoofed email address will contain personal information such as the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":969,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Email spoofing comes from the word <strong>spoof<\/strong>, which is basically another word for <strong>falsified<\/strong>. An email has been spoofed when the sender deliberately alters parts of the email to make the message appear as though it was composed and sent by someone else. Usually this is the sender\u2019s name or email address and the body of the message are formatted to appear as if they are from a legitimate source.\r\n\r\nA spoofed message can appear to be sent from a coworker, a bank, a family member or any number of seemingly trustworthy sources. A good spoof is quite convincing and will look like any other email that you would normally receive.\r\n\r\n[box type=\"warning\"] Warning: If you suspect you have received a fraudulent message DO NOT click any link in the message or enter any information that is requested.[\/box]\r\n<h3>What are the reasons behind why people spoof email?<\/h3>\r\nAn email is usually spoofed as part of a phishing attack\r\n\r\nA spoofed email may also be used to dishonestly market an online service or sell you a product that turns out not to be real. The goal of the email is to trick the recipient into making a damaging statement or releasing sensitive information, such as a password. If for example you're receiving bounced email returned to you for messages that you did not send, this could be the result of spoofing.I\r\n<h3><b>How to Identify a spoofed message<\/b><\/h3>\r\nIt is imperative that all email users understand that emails that appear to be sent from colleague's or friends can possibly be forged emails. This is the case when scammers will alter different sections of an email to disguise who the <em>actual<\/em> sender of the message is.\r\n\r\nA user may be able to recognize a email spoofing attempt by hovering over the senders email address to see it in fact the expected email address. With some devices, this level of diligence may not be sufficient and it will be necessary to open the <strong>email headers<\/strong> of a message.\r\n\r\nExamples of properties with the email that are spoofed:\r\n\r\n<strong>FROM<\/strong> <a>boss@companyexample.com<\/a>(This will appear to come from a legitimate source on any spoofed message)\r\n\r\n<strong>REPLY-TO<\/strong> This can also be spoofed, but a lazy scammer will leave the actual <strong>REPLY-TO<\/strong> address. If you see a different sending address here, the email may have been spoofed.\r\n\r\n<strong>RETURN-PATH<\/strong> This can also be spoofed, but a lazy scammer will leave the actual <strong>RETURN-PATH<\/strong> address. If you see a different sending address here, the email may have been spoofed.\r\n\r\n<strong>SOURCE IP<\/strong> address or \u201cX-ORIGIN\u201d address. This is typically more difficult to alter but it is possible.\r\n\r\nThese first three properties can be easily altered by using settings in your Microsoft Outlook, Gmail, Hotmail, or other email software. The fourth property above, IP address, can also be altered, but usually requires more sophisticated user knowledge to make a false IP address convincing.\r\n\r\n<img class=\"alignnone size-full wp-image-973\" src=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/email-spoof-assistant.png\" alt=\"Email spoof example\" width=\"358\" height=\"54\" \/>\r\n\r\n\u00a0\r\n\r\nIn this example, it appears that the recipient has received a message from their office assistant, requesting money. The <strong>subject<\/strong> line should alert you immediately. This user should contact their assistant through another form of communication to confirm that they did not send this message. Next, you will want to discover who actually sent the message by opening the message headers.\r\n\r\n<img class=\"alignnone size-full wp-image-974\" src=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/email-spoof-example.png\" alt=\"Pointing out email spoof\" width=\"416\" height=\"65\" \/>\r\n\r\n\u00a0\r\n\r\n<strong>From:<\/strong> field shows the message being sent from <strong>\"Assistant\" <a>assistant@yourdomainexample.com<\/a><\/strong>. However, we can also see that the\r\n\r\n<strong>REPLY-TO:<\/strong> field lists <em> <a>spoofer@scam.com<\/a><\/em>. That is a clear cut example of a spoofed message. You will want to Blacklist any address you find in the\r\n\r\n<b>REPLAY<\/b> <strong>RETURN-PATH<\/strong>, and <strong>SOURCE IP<\/strong> field that is not an address\/IP you normally receive mail from. For more information on viewing and understanding email headers, please see <a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/60\/Displaying-and-Hiding-the-Full-Header.html\">View email headers in Webmail.<\/a>\r\n<h3 id=\"combat-spoofing\" class=\"ng-scope\">How to fight email spoofing<\/h3>\r\nThe first line of defense against this abuse is user education, If a user receives a spoofed message, please advise them to do the following.\r\n<ul>\r\n \t<li>Blacklist any address\/IP listed in the <strong>REPLY-TO<\/strong>, <strong>RETURN-PATH<\/strong>, or <strong>SOURCE IP found within the email headers that <\/strong> you have determined to be fraudulent. See <a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/18\/I-need-to-blacklist-a-domain.html\"> Blacklist addresses, domains, and IPs in Webmail<\/a>for instructions.<\/li>\r\n \t<li>Immediately <a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/54\/How-To-Change-Your-Webmail-Password.html\">change the password of your email account<\/a> if you or your users provided that information at any point.<\/li>\r\n \t<li>Alert other employees within your business of the situation.<\/li>\r\n<\/ul>\r\nSpoofing is possibly the most frustrating abuse issue to deal with, simply put, because it cannot be stopped.\r\n\r\nSpoofing is similar to hand-writing many letters, and signing someone else's name to it. This makes tracing or tracking the activity extremely difficult.\r\n\r\nIf you are an individual and looking to report an abusive email, we recommend forwarding the abusive message to abuse@thexyz.com Our anti-abuse specialists will process the complaint and take the necessary remediation steps.","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is email spoofing? - Thexyz Blog<\/title>\n<meta name=\"description\" content=\"A spoofed message can appear to come from a coworker, a bank, a family member, or any number of seemingly trustworthy sources. A good spoof message looks like any other email that you normally receive.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is email spoofing? - Thexyz Blog\" \/>\n<meta property=\"og:description\" content=\"A spoofed message can appear to come from a coworker, a bank, a family member, or any number of seemingly trustworthy sources. A good spoof message looks like any other email that you normally receive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/\" \/>\n<meta property=\"og:site_name\" content=\"Thexyz Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-10T03:47:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-04T14:00:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"314\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Perry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Perry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/\"},\"author\":{\"name\":\"Perry\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223\"},\"headline\":\"What is email spoofing?\",\"datePublished\":\"2019-04-10T03:47:54+00:00\",\"dateModified\":\"2022-09-04T14:00:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/\"},\"wordCount\":1099,\"image\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png\",\"articleSection\":[\"How To\"],\"inLanguage\":\"en-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/\",\"url\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/\",\"name\":\"What is email spoofing? - Thexyz Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png\",\"datePublished\":\"2019-04-10T03:47:54+00:00\",\"dateModified\":\"2022-09-04T14:00:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223\"},\"description\":\"A spoofed message can appear to come from a coworker, a bank, a family member, or any number of seemingly trustworthy sources. A good spoof message looks like any other email that you normally receive.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#primaryimage\",\"url\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png\",\"contentUrl\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png\",\"width\":600,\"height\":314,\"caption\":\"Email spoofing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.thexyz.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is email spoofing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/#website\",\"url\":\"https:\/\/www.thexyz.com\/blog\/\",\"name\":\"Thexyz Blog\",\"description\":\"Email and Domains\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.thexyz.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223\",\"name\":\"Perry\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g\",\"caption\":\"Perry\"},\"description\":\"Perry is founder and a developer of Thexyz. I write code to fight for our human right to privacy. I am keen to create a cloud service which is so easy to use, respects user privacy and follows best security practices. We really deserve better.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ptoone\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is email spoofing? - Thexyz Blog","description":"A spoofed message can appear to come from a coworker, a bank, a family member, or any number of seemingly trustworthy sources. A good spoof message looks like any other email that you normally receive.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/","og_locale":"en_US","og_type":"article","og_title":"What is email spoofing? - Thexyz Blog","og_description":"A spoofed message can appear to come from a coworker, a bank, a family member, or any number of seemingly trustworthy sources. A good spoof message looks like any other email that you normally receive.","og_url":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/","og_site_name":"Thexyz Blog","article_published_time":"2019-04-10T03:47:54+00:00","article_modified_time":"2022-09-04T14:00:50+00:00","og_image":[{"width":600,"height":314,"url":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png","type":"image\/png"}],"author":"Perry","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png","twitter_misc":{"Written by":"Perry","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#article","isPartOf":{"@id":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/"},"author":{"name":"Perry","@id":"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223"},"headline":"What is email spoofing?","datePublished":"2019-04-10T03:47:54+00:00","dateModified":"2022-09-04T14:00:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/"},"wordCount":1099,"image":{"@id":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png","articleSection":["How To"],"inLanguage":"en-CA"},{"@type":"WebPage","@id":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/","url":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/","name":"What is email spoofing? - Thexyz Blog","isPartOf":{"@id":"https:\/\/www.thexyz.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#primaryimage"},"image":{"@id":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png","datePublished":"2019-04-10T03:47:54+00:00","dateModified":"2022-09-04T14:00:50+00:00","author":{"@id":"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223"},"description":"A spoofed message can appear to come from a coworker, a bank, a family member, or any number of seemingly trustworthy sources. A good spoof message looks like any other email that you normally receive.","breadcrumb":{"@id":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#primaryimage","url":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png","contentUrl":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-email-spoofing-min.png","width":600,"height":314,"caption":"Email spoofing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.thexyz.com\/blog\/what-is-email-spoofing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thexyz.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is email spoofing?"}]},{"@type":"WebSite","@id":"https:\/\/www.thexyz.com\/blog\/#website","url":"https:\/\/www.thexyz.com\/blog\/","name":"Thexyz Blog","description":"Email and Domains","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thexyz.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Person","@id":"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223","name":"Perry","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g","caption":"Perry"},"description":"Perry is founder and a developer of Thexyz. I write code to fight for our human right to privacy. I am keen to create a cloud service which is so easy to use, respects user privacy and follows best security practices. We really deserve better.","sameAs":["https:\/\/www.linkedin.com\/in\/ptoone\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts\/1005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/comments?post=1005"}],"version-history":[{"count":21,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts\/1005\/revisions"}],"predecessor-version":[{"id":2466,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts\/1005\/revisions\/2466"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/media\/969"}],"wp:attachment":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/media?parent=1005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/categories?post=1005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/tags?post=1005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}