SMBCyberHub - Cybersecurity Compliance Kits for Small Business SMBCyberHub Home

Stop Fake Emails: Spoofing vs Lookalike Domains (Complete Guide for Small Teams)

28 Oct 2025

Fake invoices. β€œCEO” wire requests. Supplier bank-detail changes. Most start with a fake sender. Here’s a simple guide to the two most common tricksβ€”and a small-team playbook to block them fast.

πŸ” Understanding Email Forgery Techniques

What’s the difference?

Email Spoofing (Your Domain is Forged)

Attackers send mail that pretends to be you@yourcompany.com. This is the most common and dangerous type of email forgery.

How Spoofing Works:

  • SMTP protocol allows any sender to specify any β€œFrom” address
  • No built-in verification in basic email protocols
  • Easy to implement with simple email clients
  • Hard to detect without proper email authentication

Protection Methods:

  • SPF (Sender Policy Framework): Lists authorized email servers
  • DKIM (DomainKeys Identified Mail): Digital signatures for emails
  • DMARC (Domain-based Message Authentication): Policy for handling unauthenticated emails

Lookalike Domains (Cousin Domains)

Attackers register yourcornpany.com or your-company.co and email from there. Your domain settings can’t block this directly.

How Lookalikes Work:

  • Domain registration: Attackers register similar-looking domains
  • Visual deception: Users may not notice the slight differences
  • Technical legitimacy: These are real domains, not forged
  • Hard to block: Requires different protection strategies

Common Lookalike Variations:

  • Typosquatting: gogle.com instead of google.com
  • Character substitution: micr0soft.com instead of microsoft.com
  • TLD changes: company.co instead of company.com
  • Hyphen variations: your-company.com vs yourcompany.com

πŸ›‘οΈ Technical Protection Strategies

Step 1: Implement SPF, DKIM, and DMARC

SPF (Sender Policy Framework)

  • Purpose: Lists authorized email servers for your domain
  • Implementation: Create TXT record in DNS
  • Syntax: v=spf1 include:_spf.google.com ~all
  • Monitoring: Review SPF results regularly

DKIM (DomainKeys Identified Mail)

  • Purpose: Digital signatures to verify email authenticity
  • Implementation: Generate keys, publish public key in DNS
  • Configuration: Enable in email service providers
  • Rotation: Rotate keys periodically for security

DMARC (Domain-based Message Authentication)

  • Purpose: Policy for handling unauthenticated emails
  • Implementation: Create TXT record in DNS
  • Policy levels: none, quarantine, reject
  • Reporting: Aggregate and forensic reports

Implementation Process:

  1. Inventory email services: List all services sending email
  2. Configure SPF: Add all authorized senders to SPF record
  3. Enable DKIM: Set up DKIM signing in each service
  4. Publish DMARC: Start with p=quarantine, monitor results
  5. Monitor reports: Review DMARC aggregate and forensic reports
  6. Adjust policy: Move to p=reject once aligned

Step 2: Lock Down Domain and DNS

Domain Registrar Security:

  • Registrar lock: Prevent unauthorized domain transfers
  • Multi-factor authentication: Enable MFA on registrar account
  • Access control: Limit who can make DNS changes
  • Monitoring: Monitor for unauthorized changes

DNS Security:

  • DNSSEC: Enable DNS Security Extensions
  • Access logging: Log all DNS changes
  • Documentation: Document DNS configuration
  • Backup: Keep secure backups of DNS records

Email Provider Security:

  • Admin access: Limit admin access to email systems
  • API keys: Secure all API keys and credentials
  • Service accounts: Secure service account credentials
  • Integration security: Secure third-party integrations

πŸ‘₯ People and Process Controls

Step 3: Make Real Addresses Visible

Email Client Configuration:

  • Full sender address: Display complete email address
  • External sender warnings: Banner for external emails
  • Domain highlighting: Highlight unfamiliar domains
  • Sender verification: Show authentication status

Visual Security Indicators:

  • Trust seals: Visual indicators for authenticated emails
  • Warning banners: Alerts for suspicious emails
  • Color coding: Different colors for internal vs external
  • Authentication status: Show SPF/DKIM/DMARC results

User Education:

  • Training programs: Regular security awareness training
  • Phishing simulations: Test user recognition skills
  • Security newsletters: Regular security updates
  • Incident reporting: Clear reporting procedures

Step 4: Reduce Lookalike Confusion

Domain Protection Strategy:

  • Register variants: Buy obvious typo domains
  • Redirect domains: Redirect variants to main domain
  • Monitoring: Monitor for new domain registrations
  • Legal action: Take action against infringing domains

Lookalike Detection:

  • Visual similarity: Tools to detect similar domains
  • Brand monitoring: Monitor for brand abuse
  • Threat intelligence: Monitor for new threats
  • Automated alerts: Alert on suspicious domains

Process Controls:

  • Verification procedures: Call-back verification for sensitive requests
  • Approval workflows: Multi-level approval for financial transactions
  • Documentation: Keep records of all verifications
  • Regular reviews: Periodic security assessments

πŸ“‹ Complete Implementation Checklist

Technical Controls

  • Publish SPF record for all email services
  • Enable DKIM signing in all email services
  • Publish DMARC policy with monitoring
  • Enable domain registrar lock and MFA
  • Configure DNSSEC for domain security
  • Set up email security monitoring
  • Implement external sender warnings
  • Configure email client security settings

Process Controls

  • Establish verification procedures for sensitive requests
  • Create approval workflows for financial transactions
  • Implement callback verification for payment changes
  • Document all security procedures
  • Regular security training for all staff
  • Incident response procedures for email security
  • Regular security reviews and assessments

Domain Protection

  • Register obvious typo domains
  • Set up redirects for variant domains
  • Monitor for new domain registrations
  • Legal action against infringing domains
  • Brand monitoring for abuse
  • Threat intelligence monitoring
  • Automated alerts for suspicious domains

🚨 Advanced Protection Strategies

Email Security Gateway

Implement advanced email filtering and protection.

Features:

  • Advanced filtering: Block suspicious emails
  • URL analysis: Check links for malicious content
  • Attachment scanning: Scan for malware
  • Sandboxing: Test suspicious emails in isolation
  • Machine learning: AI-powered threat detection

Implementation:

  • Cloud-based solutions: Microsoft Defender, Mimecast
  • On-premises solutions: Barracuda, Proofpoint
  • Hybrid solutions: Combination of cloud and on-premises
  • Custom rules: Tailored to business requirements

Brand Protection Services

Professional services to protect your brand online.

Services:

  • Domain monitoring: Monitor for brand abuse
  • Takedown services: Remove infringing content
  • Legal support: Legal action against infringers
  • Intelligence feeds: Threat intelligence data
  • Reporting: Regular brand protection reports

Implementation:

  • Brand protection platforms: MarkMonitor, BrandShield
  • Legal services: Intellectual property law firms
  • Security consultants: Cybersecurity consulting firms
  • Managed services: Ongoing protection services

🎯 Key Takeaways

Remember These Rules

  1. Email spoofing can be blocked with SPF, DKIM, DMARC
  2. Lookalike domains require different protection strategies
  3. Technical controls are essential but not sufficient
  4. People and processes are critical for protection
  5. Regular monitoring and updates are necessary

Your Action Plan

Our cybersecurity compliance kits include email security policies, phishing awareness training, and audit-ready checklists to protect your team from spoofing attacks.

  • Implement SPF, DKIM, DMARC for all email services
  • Lock down domain and DNS security
  • Configure email clients for security
  • Register typo domains and set up redirects
  • Establish verification procedures for sensitive requests
  • Train staff on email security awareness
  • Monitor and review security regularly

Success Metrics

  • Zero successful email spoofing attacks
  • Reduced lookalike domain incidents
  • Staff recognition of suspicious emails
  • Proper verification of sensitive requests
  • Compliance with email security standards
  • Reduced financial losses from email fraud

GDPR Article 32(4)

  • Security of processing: Implement appropriate technical measures
  • Data protection by design: Use strong authentication methods
  • Access control: Limit access to authorized personnel

ISO27001 Clause 7.2.2

  • Information security awareness: Train staff on security procedures
  • Incident response: Document and test response procedures
  • Business continuity: Ensure operations during security incidents

Industry Regulations

  • HIPAA: Email security for healthcare data
  • PCI DSS: Email security for payment data
  • SOX: Internal controls for financial reporting
  • NYDFS: Cybersecurity requirements for financial services

πŸ“š Download Your Free Cyber Security Training Kit

Need ready-to-use checklists and a quick staff refresher?
πŸ‘‰ Download the Free Cyber Security Training Kit


External Resources:

  • DMARC.org: DMARC overview and implementation guide
  • SPF Project: SPF documentation and tools
  • DKIM.org: DKIM implementation guide
  • National Cyber Security Centre: Email security guidance

πŸ•’ Estimated Reading Time: 18 minutes
πŸ” Aligned With: GDPR Article 32(4), ISO27001 Clause 7.2.2
πŸ“Š Target Audience: Small business owners, IT administrators, security managers
🎯 Learning Objectives: Understand email forgery, implement email authentication, protect against spoofing and lookalikes

🎣 Complete Phishing Protection Kit

Get our phishing awareness training slides, staff quizzes, and prevention checklists. Everything you need to protect your team from email attacks.