{"id":7039,"date":"2024-09-29T14:43:18","date_gmt":"2024-09-29T14:43:18","guid":{"rendered":"https:\/\/www.smarthost.au\/blog\/?p=7039"},"modified":"2024-09-29T14:43:18","modified_gmt":"2024-09-29T14:43:18","slug":"how-to-detect-email-sender-spoofing","status":"publish","type":"post","link":"https:\/\/www.smarthost.au\/blog\/how-to-detect-email-sender-spoofing","title":{"rendered":"How to detect email sender spoofing?"},"content":{"rendered":"\n<p>Recently, the most common way to steal data and infect computers is by sending emails with malicious content. These emails appear very serious, seemingly from a &#8220;legitimate&#8221; sender that the recipient recognizes.<\/p>\n\n\n\n<p><strong>The emails are usually sent from previously hacked email accounts, impersonating a specific company by forging the message header.<\/strong><\/p>\n\n\n\n<p>In this article, we will show how to easily distinguish legitimate messages from those impersonating companies or institutions.<\/p>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">An example of a message with a spoofed header:<\/h2>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>From:<\/strong> smarthost.au &lt;info@weshoes.co.il><br><strong>To:<\/strong>\u00a0********<br><strong>Date:<\/strong> 17 lipca 2020, 16:34:25<br><strong>Subject:<\/strong> smarthost.au : Your Account Will Be Blocked Urgent[WARNING]<br><br><br>Dear \u00a0biuro<br><br>All account are requires an immediate verification 2020 server security ,<br><br>Failure to do this. We may be forced to terminate the activities of your account.<br><br>to make sure your are the real owner of this email,\u00a0*******<br><br>You have 24hours to perform this action from below portal.<br><br><br>VERIFY ACCOUNT NOW<br><br>Copyright \u00a9 2020 smarthost.au, Inc. All rights reserved. We are located at 2233 S. third St., San Jose, CA 95123.<\/pre>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center\"><em>Scammers often send similar emails impersonating banks, payment operators, or other service providers, which is why it\u2019s crucial to verify the sender every time before taking any actions encouraged by the email content.<\/em><\/p>\n\n\n\n<div style=\"height:96px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Verifying e-mail sender.<\/h2>\n\n\n\n<p>Sometimes, we receive emails that appear to be from a well-known company or bank, but the message doesn&#8217;t actually come from the official email address of that institution.<\/p>\n\n\n\n<p>Every email is represented by a &#8220;friendly name&#8221; field, which often displays a pleasant name like &#8220;John Smith,&#8221; &#8220;ING Bank,&#8221; or &#8220;T-Mobile Customer Service.&#8221; In addition to this &#8220;friendly&#8221; name in the sender field, there is also the actual email address from which the email was sent. This email should come from a known and official domain of the provider (e.g., as in the examples above: ing.com, t-mobile.com, or smarthost.eu), but often, it is falsified\u2014the sender is someone other than the legitimate institution.<\/p>\n\n\n\n<p>The sender might appear as: t-mobile.com or smarthost.eu (which is the &#8220;friendly name&#8221;), but the email is sent from an address like <a>info@vilcongloplc.pw<\/a>, <a>info@weshoes.co.il<\/a>, or any other. It\u2019s clear that the sender has swapped the &#8220;friendly name&#8221; to deceive the recipient.<\/p>\n\n\n\n<p><strong>Therefore, it\u2019s important to always check the actual email address from which the message was sent and not just rely on the sender&#8217;s name.<\/strong><\/p>\n\n\n\n<div style=\"height:62px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">How to verify the sender&#8217;s real email address?<\/h2>\n\n\n\n<div style=\"height:44px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To verify the email sender in Webmail (e.g., Roundcube), follow the steps shown in the images below. In other applications, the process will be similar. In some, such as Thunderbird, the sender&#8217;s real email address will be displayed immediately upon opening the message.<\/p>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.smarthost.eu\/blog\/wp-content\/uploads\/2024\/09\/image-41.png\" alt=\"\" class=\"wp-image-11998\"\/><figcaption class=\"wp-element-caption\"><em>Click on &#8220;Details&#8221;<\/em><\/figcaption><\/figure><\/div>\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.smarthost.eu\/blog\/wp-content\/uploads\/2024\/09\/image-40.png\" alt=\"\" class=\"wp-image-11994\"\/><figcaption class=\"wp-element-caption\"><em>When you hover your cursor over the sender&#8217;s name, the full email address will appear.<br><\/em><br><\/figcaption><\/figure><\/div>\n\n\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Additional sender verification.<\/h2>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>If you have doubts about whether the email was really sent by the stated sender, it\u2019s best to contact them via phone, chat, or email. However, be careful: do not reply to the &#8220;suspicious&#8221; email. Instead, send a completely new message to the known, official email address found on the company&#8217;s website.<\/p>\n\n\n\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Taking care of security<\/strong>.<\/h2>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>It\u2019s also important to maintain the security of your own email accounts to prevent them from being used as tools to send similar fraudulent messages.<\/p>\n\n\n\n<p>First and foremost, you should set strong passwords that are difficult for scammers to crack and use different passwords for every system or account you access.<\/p>\n\n\n\n<p>By having unique passwords for each account, even if one account is compromised, the scammer won\u2019t be able to access other accounts with different passwords.<\/p>\n\n\n\n<p><strong>Our security largely depends on ourselves, so before clicking on a link sent in an email, always verify the sender of the message.<\/strong><\/p>\n\n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>With Smarthost Sp. z o.o. you can contact through:<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>e-mail:<\/strong> <a href=\"mailto:hosting@smarthost.au\">hosting@smarthost.au<\/a><br><strong>chat online:<\/strong> <a href=\"https:\/\/www.smarthost.au\/\">https:\/\/www.smarthost.au\/<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, the most common way to steal data and infect computers is by sending emails with malicious content. These emails appear very serious, seemingly from a &#8220;legitimate&#8221; sender that the recipient recognizes. The emails are<a class=\"read-more\" href=\"https:\/\/www.smarthost.au\/blog\/how-to-detect-email-sender-spoofing\">Continue reading<\/a><\/p>\n","protected":false},"author":27,"featured_media":7103,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[215,1021,177,8,261],"tags":[399,397,1002,75,1280],"class_list":["post-7039","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-e-mail","category-guides","category-important","category-security","category-spam-hr","tag-e-mail-hr","tag-email-hr","tag-roundcube","tag-security","tag-spoofing"],"_links":{"self":[{"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/posts\/7039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/comments?post=7039"}],"version-history":[{"count":1,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/posts\/7039\/revisions"}],"predecessor-version":[{"id":7040,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/posts\/7039\/revisions\/7040"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/media\/7103"}],"wp:attachment":[{"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/media?parent=7039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/categories?post=7039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/tags?post=7039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}