Stop Fake Emails: Spoofing vs Lookalike Domains (Complete Guide for Small Teams)
28 Oct 2025
Fake invoices. βCEOβ wire requests. Supplier bank-detail changes. Most start with a fake sender. Hereβs a simple guide to the two most common tricksβand a small-team playbook to block them fast.
π Understanding Email Forgery Techniques
Whatβs the difference?
Email Spoofing (Your Domain is Forged)
Attackers send mail that pretends to be you@yourcompany.com. This is the most common and dangerous type of email forgery.
How Spoofing Works:
- SMTP protocol allows any sender to specify any βFromβ address
- No built-in verification in basic email protocols
- Easy to implement with simple email clients
- Hard to detect without proper email authentication
Protection Methods:
- SPF (Sender Policy Framework): Lists authorized email servers
- DKIM (DomainKeys Identified Mail): Digital signatures for emails
- DMARC (Domain-based Message Authentication): Policy for handling unauthenticated emails
Lookalike Domains (Cousin Domains)
Attackers register yourcornpany.com or your-company.co and email from there. Your domain settings canβt block this directly.
How Lookalikes Work:
- Domain registration: Attackers register similar-looking domains
- Visual deception: Users may not notice the slight differences
- Technical legitimacy: These are real domains, not forged
- Hard to block: Requires different protection strategies
Common Lookalike Variations:
- Typosquatting:
gogle.cominstead ofgoogle.com - Character substitution:
micr0soft.cominstead ofmicrosoft.com - TLD changes:
company.coinstead ofcompany.com - Hyphen variations:
your-company.comvsyourcompany.com
π‘οΈ Technical Protection Strategies
Step 1: Implement SPF, DKIM, and DMARC
SPF (Sender Policy Framework)
- Purpose: Lists authorized email servers for your domain
- Implementation: Create TXT record in DNS
- Syntax:
v=spf1 include:_spf.google.com ~all - Monitoring: Review SPF results regularly
DKIM (DomainKeys Identified Mail)
- Purpose: Digital signatures to verify email authenticity
- Implementation: Generate keys, publish public key in DNS
- Configuration: Enable in email service providers
- Rotation: Rotate keys periodically for security
DMARC (Domain-based Message Authentication)
- Purpose: Policy for handling unauthenticated emails
- Implementation: Create TXT record in DNS
- Policy levels:
none,quarantine,reject - Reporting: Aggregate and forensic reports
Implementation Process:
- Inventory email services: List all services sending email
- Configure SPF: Add all authorized senders to SPF record
- Enable DKIM: Set up DKIM signing in each service
- Publish DMARC: Start with
p=quarantine, monitor results - Monitor reports: Review DMARC aggregate and forensic reports
- Adjust policy: Move to
p=rejectonce aligned
Step 2: Lock Down Domain and DNS
Domain Registrar Security:
- Registrar lock: Prevent unauthorized domain transfers
- Multi-factor authentication: Enable MFA on registrar account
- Access control: Limit who can make DNS changes
- Monitoring: Monitor for unauthorized changes
DNS Security:
- DNSSEC: Enable DNS Security Extensions
- Access logging: Log all DNS changes
- Documentation: Document DNS configuration
- Backup: Keep secure backups of DNS records
Email Provider Security:
- Admin access: Limit admin access to email systems
- API keys: Secure all API keys and credentials
- Service accounts: Secure service account credentials
- Integration security: Secure third-party integrations
π₯ People and Process Controls
Step 3: Make Real Addresses Visible
Email Client Configuration:
- Full sender address: Display complete email address
- External sender warnings: Banner for external emails
- Domain highlighting: Highlight unfamiliar domains
- Sender verification: Show authentication status
Visual Security Indicators:
- Trust seals: Visual indicators for authenticated emails
- Warning banners: Alerts for suspicious emails
- Color coding: Different colors for internal vs external
- Authentication status: Show SPF/DKIM/DMARC results
User Education:
- Training programs: Regular security awareness training
- Phishing simulations: Test user recognition skills
- Security newsletters: Regular security updates
- Incident reporting: Clear reporting procedures
Step 4: Reduce Lookalike Confusion
Domain Protection Strategy:
- Register variants: Buy obvious typo domains
- Redirect domains: Redirect variants to main domain
- Monitoring: Monitor for new domain registrations
- Legal action: Take action against infringing domains
Lookalike Detection:
- Visual similarity: Tools to detect similar domains
- Brand monitoring: Monitor for brand abuse
- Threat intelligence: Monitor for new threats
- Automated alerts: Alert on suspicious domains
Process Controls:
- Verification procedures: Call-back verification for sensitive requests
- Approval workflows: Multi-level approval for financial transactions
- Documentation: Keep records of all verifications
- Regular reviews: Periodic security assessments
π Complete Implementation Checklist
Technical Controls
- Publish SPF record for all email services
- Enable DKIM signing in all email services
- Publish DMARC policy with monitoring
- Enable domain registrar lock and MFA
- Configure DNSSEC for domain security
- Set up email security monitoring
- Implement external sender warnings
- Configure email client security settings
Process Controls
- Establish verification procedures for sensitive requests
- Create approval workflows for financial transactions
- Implement callback verification for payment changes
- Document all security procedures
- Regular security training for all staff
- Incident response procedures for email security
- Regular security reviews and assessments
Domain Protection
- Register obvious typo domains
- Set up redirects for variant domains
- Monitor for new domain registrations
- Legal action against infringing domains
- Brand monitoring for abuse
- Threat intelligence monitoring
- Automated alerts for suspicious domains
π¨ Advanced Protection Strategies
Email Security Gateway
Implement advanced email filtering and protection.
Features:
- Advanced filtering: Block suspicious emails
- URL analysis: Check links for malicious content
- Attachment scanning: Scan for malware
- Sandboxing: Test suspicious emails in isolation
- Machine learning: AI-powered threat detection
Implementation:
- Cloud-based solutions: Microsoft Defender, Mimecast
- On-premises solutions: Barracuda, Proofpoint
- Hybrid solutions: Combination of cloud and on-premises
- Custom rules: Tailored to business requirements
Brand Protection Services
Professional services to protect your brand online.
Services:
- Domain monitoring: Monitor for brand abuse
- Takedown services: Remove infringing content
- Legal support: Legal action against infringers
- Intelligence feeds: Threat intelligence data
- Reporting: Regular brand protection reports
Implementation:
- Brand protection platforms: MarkMonitor, BrandShield
- Legal services: Intellectual property law firms
- Security consultants: Cybersecurity consulting firms
- Managed services: Ongoing protection services
π― Key Takeaways
Remember These Rules
- Email spoofing can be blocked with SPF, DKIM, DMARC
- Lookalike domains require different protection strategies
- Technical controls are essential but not sufficient
- People and processes are critical for protection
- Regular monitoring and updates are necessary
Your Action Plan
Our cybersecurity compliance kits include email security policies, phishing awareness training, and audit-ready checklists to protect your team from spoofing attacks.
- Implement SPF, DKIM, DMARC for all email services
- Lock down domain and DNS security
- Configure email clients for security
- Register typo domains and set up redirects
- Establish verification procedures for sensitive requests
- Train staff on email security awareness
- Monitor and review security regularly
Success Metrics
- Zero successful email spoofing attacks
- Reduced lookalike domain incidents
- Staff recognition of suspicious emails
- Proper verification of sensitive requests
- Compliance with email security standards
- Reduced financial losses from email fraud
π Compliance and Legal Considerations
GDPR Article 32(4)
- Security of processing: Implement appropriate technical measures
- Data protection by design: Use strong authentication methods
- Access control: Limit access to authorized personnel
ISO27001 Clause 7.2.2
- Information security awareness: Train staff on security procedures
- Incident response: Document and test response procedures
- Business continuity: Ensure operations during security incidents
Industry Regulations
- HIPAA: Email security for healthcare data
- PCI DSS: Email security for payment data
- SOX: Internal controls for financial reporting
- NYDFS: Cybersecurity requirements for financial services
π Download Your Free Cyber Security Training Kit
Need ready-to-use checklists and a quick staff refresher?
π Download the Free Cyber Security Training Kit
π Related Resources
Internal Links:
- How Phishing Actually Works: A Simple Breakdown for Small Teams
- Stop Payment Fraud: A Simple Callback Playbook for Invoice & Bank-Detail Changes
- What Happens After a Phishing Click?
External Resources:
- DMARC.org: DMARC overview and implementation guide
- SPF Project: SPF documentation and tools
- DKIM.org: DKIM implementation guide
- National Cyber Security Centre: Email security guidance
π Estimated Reading Time: 18 minutes
π Aligned With: GDPR Article 32(4), ISO27001 Clause 7.2.2
π Target Audience: Small business owners, IT administrators, security managers
π― Learning Objectives: Understand email forgery, implement email authentication, protect against spoofing and lookalikes
π£ Complete Phishing Protection Kit
Get our phishing awareness training slides, staff quizzes, and prevention checklists. Everything you need to protect your team from email attacks.