{"id":480,"date":"2023-05-08T10:30:00","date_gmt":"2023-05-08T02:30:00","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=480"},"modified":"2023-05-05T11:23:36","modified_gmt":"2023-05-05T03:23:36","slug":"email-spoofing-how-do-attackers-spoof-an-email-address","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/","title":{"rendered":"Email Spoofing: How do attackers spoof an email address?"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> &gt; <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> &gt; Email Spoofing: How do attackers spoof an email address?<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-bm2th3z \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-bm2th3z button-1\" data-id=\"eb-advance-heading-bm2th3z\"><h1 class=\"eb-ah-title\">Email Spoofing: How do attackers spoof an email address?<\/h1><p class=\"eb-ah-subtitle\">May 08, 2023<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16-1024x538.jpg\" alt=\"\" class=\"wp-image-489\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Email spoofing is a method that cybercriminal uses to trick you into thinking that an email is sent from someone you know or trust, such as your customer, supplier, colleague, or an authorized bank. It is often used in phishing attacks, designed to take over your account, send viruses, steal sensitive information or money.<\/p>\n\n\n\n<p>Email spoofing may sound like a sophisticated technique, but it is actually rather simple. It does not require hacking into an account. Instead, it involves modifying the email headers to look like they are coming from a legitimate entity, by using a look-alike email address, or a similar email format (e.g. signature).<\/p>\n\n\n\n<p>Spoofed emails can be dangerous and damaging if you are unfamiliar of how to identify one. Here are common types of email spoofing that you should be aware of if you receive one.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"root-eb-toc-rvwj6ms wp-block-essential-blocks-table-of-contents\"><div class=\"eb-parent-wrapper eb-parent-eb-toc-rvwj6ms \"><div class=\"eb-toc-container eb-toc-rvwj6ms  eb-toc-is-not-sticky eb-toc-collapsible eb-toc-initially-not-collapsed eb-toc-scrollToTop style-1 list-style-none\" data-scroll-top=\"false\" data-scroll-top-icon=\"fas fa-angle-up\" data-collapsible=\"true\" data-sticky-hide-mobile=\"false\" data-sticky=\"false\" data-scroll-target=\"scroll_to_toc\" data-copy-link=\"false\" data-editor-type=\"\" data-hide-desktop=\"false\" data-hide-tab=\"false\" data-hide-mobile=\"false\" data-itemCollapsed=\"false\" data-highlight-scroll=\"false\"><div class=\"eb-toc-header\"><h2 class=\"eb-toc-title\">Table of Contents<\/h2><\/div><div class=\"eb-toc-wrapper \" data-headers=\"[{&quot;level&quot;:2,&quot;content&quot;:&quot;Spoofing via display name&quot;,&quot;text&quot;:&quot;Spoofing via display name&quot;,&quot;link&quot;:&quot;spoofing-via-display-name&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Spoofing via lookalike domains&quot;,&quot;text&quot;:&quot;Spoofing via lookalike domains&quot;,&quot;link&quot;:&quot;spoofing-via-lookalike-domains&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Spoofing via legitimate domains&quot;,&quot;text&quot;:&quot;Spoofing via legitimate domains&quot;,&quot;link&quot;:&quot;spoofing-via-legitimate-domains&quot;}]\" data-visible=\"[false,true,false,true,false,false]\" data-delete-headers=\"[{&quot;label&quot;:&quot;Spoofing via display name&quot;,&quot;value&quot;:&quot;spoofing-via-display-name&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Spoofing via lookalike domains&quot;,&quot;value&quot;:&quot;spoofing-via-lookalike-domains&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Spoofing via legitimate domains&quot;,&quot;value&quot;:&quot;spoofing-via-legitimate-domains&quot;,&quot;isDelete&quot;:false}]\" data-smooth=\"true\" data-top-offset=\"\"><div class=\"eb-toc__list-wrap\"><ul class='eb-toc__list'><li><a href=\"#spoofing-via-display-name\">Spoofing via display name<\/a><li><a href=\"#spoofing-via-lookalike-domains\">Spoofing via lookalike domains<\/a><li><a href=\"#spoofing-via-legitimate-domains\">Spoofing via legitimate domains<\/a><\/ul><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong><strong><strong>Spoofing via display name<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-image\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-k80jtza \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-k80jtza img-style-rounded caption-style-1 caption-horizontal-center caption-vertical-bottom bottom no-effect\" data-id=\"eb-advanced-image-k80jtza\"><div class=\"image-wrapper\"><img decoding=\"async\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/spoof-via-display-name.jpg\" alt=\"\"\/><\/div><\/figure><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Display name spoofing involves forging of the email sender\u2019s display name. Hackers can do this by registering a free email address and use the same name as your contact. To further convince you, some may use your contact\u2019s full domain or email address as the sender\u2019s name.<\/p>\n\n\n\n<p>For example, Lily receives an email seemingly sent from her colleague, John Doe, but the <em>mailto:<\/em> is displaying an entirely different email address.<\/p>\n\n\n\n<p>This type of spoofed email will bypass all spoofing security measures and spam checks because it comes from a legitimate email address. Moreover, the design of many modern and mobile email client applications displays only the sender\u2019s name, making it harder for users to spot the spoofed identity.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>Spoofing via lookalike domains<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-image\"><div class=\"eb-parent-wrapper eb-parent-eb-advanced-image-z7v1x7w \"><figure class=\"eb-advanced-image-wrapper eb-advanced-image-z7v1x7w img-style-rounded caption-style-1 caption-horizontal-center caption-vertical-bottom bottom no-effect\" data-id=\"eb-advanced-image-z7v1x7w\"><div class=\"image-wrapper\"><img decoding=\"async\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/spoof-via-lookalike-domain-2.jpg\" alt=\"\"\/><\/div><\/figure><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In this type of spoofing, the hacker registers and uses a domain that is similar to the impersonated domain, e.g. \u201c@1egitimatesite.com\u201d instead of \u201c@legitimatesite.com\u201d. The change could be too small to be noticed by the recipient.<\/p>\n\n\n\n<p>This type of spoofing will also bypass spam filters as the email address is legitimate. The only way to avoid such spoofing is to look closely to the email address and spot any subtle differences.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong><strong><strong><strong><strong><strong><strong>Spoofing via legitimate domains<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p>Fundamentally, emails are relayed through Simple Mail Transfer Protocol (SMTP), which does not require any authentication. Hackers may take advantage of this vulnerability and use a trusted email address in the From header. Domains that are not employed with verification and authentication countermeasures (e.g. SPF, DKIM, DMARC) may be misused for such spoofing.<\/p>\n\n\n\n<p>Hackers may also use compromised SMTP servers, or set up malicious SMTP servers for this approach.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In the fight against email spoofing, prevention is better than cure.<br>As an email user, recognizing and avoiding spoofed emails are the first key steps to safety. If you receive a seemingly legitimate email that looks suspicious, don\u2019t trust it immediately. Verify with the sender in person or your email provider before responding to the email.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beware of spoofed emails that aim to trick you into believing that it is sent from a trusted source. Discover the types of email spoofing and avoid them to protect yourself and your organization.<\/p>\n","protected":false},"author":1,"featured_media":489,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[16,17],"class_list":["post-480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-email","tag-security-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Email Spoofing: How do attackers spoof an email address?<\/title>\n<meta name=\"description\" content=\"Learn about the different types of email spoofing to protect yourselves and your organizations from such scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Spoofing: How do attackers spoof an email address?\" \/>\n<meta property=\"og:description\" content=\"Learn about the different types of email spoofing to protect yourselves and your organizations from such scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-08T02:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\"},\"headline\":\"Email Spoofing: How do attackers spoof an email address?\",\"datePublished\":\"2023-05-08T02:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/\"},\"wordCount\":523,\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg\",\"keywords\":[\"Email\",\"Security &amp; Privacy\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/\",\"url\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/\",\"name\":\"Email Spoofing: How do attackers spoof an email address?\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg\",\"datePublished\":\"2023-05-08T02:30:00+00:00\",\"description\":\"Learn about the different types of email spoofing to protect yourselves and your organizations from such scams.\",\"breadcrumb\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#primaryimage\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg\",\"width\":1200,\"height\":630,\"caption\":\"How do attackers spoof an email address?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lookafter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email Spoofing: How do attackers spoof an email address?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lookafter.com\/blog\/#website\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lookafter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/lookafter.com\/blog\"],\"url\":\"https:\/\/lookafter.com\/blog\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Email Spoofing: How do attackers spoof an email address?","description":"Learn about the different types of email spoofing to protect yourselves and your organizations from such scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/","og_locale":"en_US","og_type":"article","og_title":"Email Spoofing: How do attackers spoof an email address?","og_description":"Learn about the different types of email spoofing to protect yourselves and your organizations from such scams.","og_url":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2023-05-08T02:30:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"Email Spoofing: How do attackers spoof an email address?","datePublished":"2023-05-08T02:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/"},"wordCount":523,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg","keywords":["Email","Security &amp; Privacy"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/","url":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/","name":"Email Spoofing: How do attackers spoof an email address?","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg","datePublished":"2023-05-08T02:30:00+00:00","description":"Learn about the different types of email spoofing to protect yourselves and your organizations from such scams.","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/05\/16.jpg","width":1200,"height":630,"caption":"How do attackers spoof an email address?"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/email-spoofing-how-do-attackers-spoof-an-email-address\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Email Spoofing: How do attackers spoof an email address?"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=480"}],"version-history":[{"count":7,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/480\/revisions"}],"predecessor-version":[{"id":495,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/480\/revisions\/495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/489"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}