How to Spot Any Spoofed & Fake Email (Ultimate Guide)
If you've ever received an email that claimsto be from some company but it seems suspicious, this video is for you. There are plenty of ways for scammers to spoofemail addresses, but here I'll show you how to tell if one is legit, using email authenticationmethods most of the big websites use at least, which are the ones most targeted by scammers. I'll mostly be using Gmail for the exampleshere because it has the most transparent information to see, but if you use other programs I'llshow you some work arounds for those too.
So yes, this is about to be a 20+ minute videojust about how to tell if an email is fake, and we are going down the rabbit hole so buckleup. There's more to it than you think. And remember you can always just throw thevideo on a faster speed if you want. Let me be clear though, this video is specificallyand ONLY going to focus on how to tell if an email is really from the website it saysit's from, NOT whether the email itself is safe or a scam. It's of course a critical part of identifyingscams, but if a hacker uses their own domain to send out scams, obviously the tests willshow the sending domain as genuine, but the sender is still a scammer! For example, at one part later in the videoI'm going to show how to view some email checks Gmail has for verifying the sender, but ifyou look at them and say "oh, wow they all passed.
I guess this email from Hacker@StealYourMoney.scammust be completely safe because the Google said so..." well you completeley missed thevery limited purpose of them. I'll try and keep the technical jargon toa minimum and just show you exactly what to look for, but I WILL need to explain whatsome of these things mean, because it's important to know WHY you're looking at these clues. Unfortunately scammers are smart, so everythingI mention will take a bit of critical thinking along with it. So just try to bear with me. And Also make sure you pay attention to ALLthe steps, don't stop half way through, because then you'll think you're safe, but each nextstep will reveal scam techniques that were NOT caught in the previous. So step 1 is going to be a bunch of differentways to check if the 'from' domain in an email is even correct. First with some obvious examples, then withsome that are extremely clever. Let's say there's en email with a subjectline and content that suggests it's from some company. No matter how legit it looks, the first thingto check is the 'from' address. Now
I know this we're starting out with thereally obvious stuff, but remember these CAN be spoofed, however if it's NOT spoofed, itis indeed the most obvious sign of a fake email. As an example from my spam box, this emailsays Fidelity Investments, but when you look, it's actually a Gmail address someone madewith fidelity in the name. This is why you check this first, becausenow this case is so obviously a scam that no further investigation is needed. So always make sure the 'from' address domainis EXACTLY what you would expect. Many scam emails don't even try to spoof domains,because unless done right, it's more likely to be caught in a spam filter. Also keep in mind when I say 'spoof', I meanthey manipulate the email address so it actually shows a legit domain even though it wasn'tsent from there, which is different than what we're seeing here, which is where they usea similar looking one, but we'll cover that later. Technically this could also be called spoofingbut for the purpose of this video just know that distinction
I'm going to make. In general, here are some things to look for. They might use a free email service like Gmail,Hotmail, Outlook, or other obscurer services you don't recognize as free email services. What you do need to really watch out for though,are domains they bought that are chosen to look similar to the real domain. For example, if they are trying to impersonatePaypal.com, they might register the domain "Paypal-Mail-Server.com", which some peoplemight just assume is real. This is why I said make sure the domain isEXACTLY what you expect, and not some other similar domain. Also be careful if they use subdomains. Maybe it says "Paypal.example.com", or "Paypal.com.[abunch of random stuff].example.com". Where example.com is the actual domain, notthe stuff before it. Nothing before the final part means anything,so always look at the root domain only. Oh and also be sure to check they didn't useletters with umlauts above them or something, or for like microsoft.com, they could useR-N-icrosoft which looks like an m but isn't, stuff like that. Check it letter by letter. There is another technique scammers may use,though is admittedly rare but still possible, which is using foreign characters in the domain. And you might not realize that domains canactually have all sorts of unicode characters in them, including foreign characters thatlook EXACTLY like standard latin versions. In 2017,
one researcher registered what lookedlike apple.com, but it was not at all. It actually had a cyrillic 'A', which wasidentical looking, but actually resulted in a fake apple.com that was indistinguishable. Because of this trick, web browsers now showthe decoded version in the URL bar, which looks like this. That's great for web browsers, but email softwaremight not decode it. And in fact, I tested a bunch of them myself,and was not happy with the results. So to do the test, first in Gmail I basicallycreated an alias that I could send from, which included a cyrillic A, the same one from thatfake apple domain in fact. I then sent myself an email from that addressand looked at it using Gmail on Desktop, Windows Mail, Outlook, the iOS default Mail app, andthe Gmail app on Android. With Gmail, it did not display any kind ofwarning upon looking at the email, nor did it highlight or change the character. However, when I copy and pasted the addressinto the 'to' field, it did give me a warning which is good, but it doesn't say which letteror anything. But really in my opinion, it should reallywarn you as soon as you have the email open.
The default Windows 10 mail app offered nohelp, it didn't warn me or anything. In Microsoft 365 Outlook, it does actuallyshow a message that tells you the email has been sent by an "international address andcontains characters from multiple languages." But it's not very obvious and I still thinkit should highlight which characters it's talking about somehow. As for the iOS Mail app and Android's Gmailapp, neither of those warned me or highlighted them in any way. So if you're really suspicious about an email,but the domain looks totally correct, you can use tools that are out there that willidentify individual text characters. You can google 'Unicode Inspector' for thissite as a good one, and if we try that example with the fake apple.com domain, you just copyand paste it in. Then it says they're all latin letters, exceptthe A says it's cyrillic, so obviously a red flag. You can also google for 'ASCII validator',which will tell you if there are any non-ascii characters. The standard ASCII character set only contains128 characters, all just normal upper and lower case letters and some punctuation, noweird look-alikes, so if there's anything besides those basic characters, an ascii validatorshould spot it. But be sure the site is NOT including ExtendedASCII, which does have some letters with umlauts, but at least those are still visibly different,only just slightly.
So basically to sum up Step 1, yes, we arestill on step 1, you want to be 100% sure, letter by letter, that the domain is exactlycorrect and the official one. AGAIN, this DOES NOT guarantee the email isautomatically safe, because it could theoretically be spoofed. The point is simply that if the domain ISwrong, we automatically know it's a scam right away, but otherwise we have more to check. Alright now onto step 2, where we'll takea look at several separate scam techniques, so be sure to pay attention. The first thing we need to look at is the'reply-to' field. In gmail you can see this by clicking thislittle dropdown arrow near the sender's name, and it will bring up this box, where we'llalso look at the other stuff here in a minute. The reply-to field is extremely importantto know about. This field tells your email program to sendreplies for this email to a different email than the email address that sent it. Of course it does have legitimate uses, butmany times, if a scammer is spoofing a domain, they HAVE to use a different reply-to address,because they don't actually have the fake email they said they sent from. Here's an example. And just pretend this one doesn't have a bigwarning and wasn't caught by the spam filter. At first glance, it looks like the email wassent by loan.uk. But if you look at the 'reply-to', it sayssome gmail account.
The scammer doesn't have the info@loan.ukemail, so they have to use a different email to receive victims replies at. Also watch out, because the reply email mightbe made to look similar. In this other email, the reply-to addressis totally different than the 'from' address, but they called used the same name in it asthe sender name to make it seem less suspicious. Also sometimes they won't even change thereply-to address, but instead in the body of the email itself just include text thatsays "send a reply at whatever email". Or of course a lot of phishing emails don'ttry to get you to reply, but rather click on a fakelogin link, or download a virus, stuff like that. So if it doesn't say reply-to some other emailaddress, it doesn't necessarily mean it's safe. In any case, if it looks like the email camefrom an official company, but the reply-to is some free email service, it's a dead giveawayit's a scam. And again later I'll show you some clues forhow to tell if it's a spoofed domain like I believe this one was. Another thing I noticed is sometimes it won'tsay 'reply to', but just says 'to'. Normally that would be your email address,but if it's some random other email, it might have been forwarded with a list. Like in this one it says "recipients", butit could say anything, and that could also be suspicious, just be aware that might bewhy. Now if you're using another email programand wondering how to see the 'reply to' address, I have some bad news for you.
I tested most of the major ones: Windows Mail,Outlook, iOS default Mail app, and Android default Gmail app. Literally the only other one that makes iteasy to see the reply-to address is the Gmail app for both Android and iOS, where there'sa similar dropdown. In all the others, you only see the reply-toemail is AFTER you click the reply button, which is really just unacceptable in my opinion. In Outlook at least there is a workaround,if you double click a message to open it in a window, then go to File > Properties, itwill show a space that says "have replies sent to", which is the reply-to address. And also below it lets you see the headerswhich we'll look at later. Now let's do step 2.5 you could say. We're still going to look at this info boxin Gmail, and specifically the fields that say 'mailed by' and 'signed by'. These won't always be there, but they cansometimes reveal certain attempts to spoof emails. I'll explain how these are actually determinedlater though. You can see in this example, it's supposedlyfrom Frank someone, and the email address is support @ some trading website. But below, it says 'signed by' some russianwebsite. Also above, it says it was sent 'via' thesame russian site. If gmail shows 'via', it means the domainsending the email doesn't match the From address. There are legitimate purposes for this -- manywebsites use mailer services to send out newsletters and stuff on their behalf, but you shouldstill be aware of what this means. And remember, this is in gmail, but not everythingelse might show this info.
That being said, this is really importantto understand. That 'via' thing might not always show upin gmail, even if the domain and email is being spoofed, ok? It only sometimes shows up. You'll learn why later in the video but thisis again one of those things where if it shows up, it makes it a lot easier, but if not,it's NOT a guarantee that it's safe and is real. For example here's one where this is obviouslya spoofed email, but it does not show 'via', so just know that. Now again, there are two that might be here,both signed-by and mailed-by. For now just know they sort of serve the samepurpose, just in a different way. Just know that basically every major techcompany like Google, Facebook, Microsoft, Apple, all them should have both of these,and of course they should say that they are mailed by and signed by an official websiteof theirs. Also any other major company worth their saltfor security should have at least one of these, and again it should match. If an email has neither, it doesn't automaticallymean the email is a scam, BUT, if it comes from a really well known website that shouldknow better, yes that is highly suspicious.
So in that case, check previous emails theysent you that you know are legitimate and see what those showed. If it is indeed signed and mailed by a domainactually owned by the company, there's a good chance the email is legit, but there is onemore place we can check to be more sure. So onto step 3, we can look at the email headers. Don't let that scare you though, it's wayeasier than it sounds. You see there are 3 major email authenticationtechnologies out there, which are SPF, DKIM, and DMARC. You don't have to know what these stand for,but they basically provide a way for people receiving emails to check with a website tosee if they really sent a specific email. If a website has it properly set up, whichagain, all major tech comapanies do for all 3, it makes it easy for your email clientto detect and block fake emails. Unfortunately, not all websites use these,and even if they do, some don't 'enforce' their policies, it's called, meaning the emailcould still get through even if they fail the checks, but that doesn't mean you can'tstill check and see what the results are yourself. So back in Gmail, they make it really easy. All you do is open an email, go to the threedots, then click 'Show Original'. And here you can see the three results forthe authentication tests I mentioned before: SPF, DKIM and DMARC. They might not all three be there, but that'sup to the website owner. So let me give you a quick rundown of theseand then I'll explain these in more detail after. So as I've said, if it's a major website,especially for a major technology company, it should almost definitely have all threeof these, and they should all say pass.
DMARC is the most significant and most powerful,because it looks at both the SPF & DKIM records, and has it's own tests too. So if you check these, and they say pass,AND you're sure the domain is actually the real one, not one made to look like it, it'sprobably a legit email. For other websites that are big but maybenot a mega corporation, they might not have all three, but hopefully SPF & DKIM, and theyboth pass, as opposed to fail. There are other possible things it might say,like 'Neutral' or 'Softfail' which I'll explain later. But if the email shows that ANY fail, I wouldbe highly suspicious. It either means their mail server was misconfigured(which is unlikely for a massive company), or it's a fake email. If you're using another email program, you'llhave to look up how to view the 'email headers' in your specific program, then you can doCtrl+F to search for the terms 'SPF', DKIM, and DMARC, and if they're in there, they'llshow the same results as would in Gmail. Not every email program even lets you seethe headers, but I showed you before how to in Outlook, you open it in in a window, thenfile, properties and then it's down there. You can copy and paste the whole thing, orjust do control+F. I want to be VERY clear here though. These three checks are NOT "is this a scam"tests. Their ONLY purpose is to check whether theemail originated from the domain it says, or at least was authorized by the domain. If a scammer registers their own domain, andsends scam emails from that domain, they can configure all those checks and it will showpass for all of them, but that just tells you "yes this was indeed sent by this scamdomain".
So this is why I put so much emphasis on checkingthat there was nothing funny going on with the domain name in Step 1, because nothingelse we do matters otherwise. And I'll say yet again, if the email seemssuspicious enough, no matter what, just be safe and assume it's a scam because you neverknow, maybe that person at that company got their email hacked and is being used to sendout legit emails that are still scams. In fact, I found one very interesting scamemail where exactly that happened. So check this email out. It was in my spam box, but it actually claimedto be from a .gov email, which is unusual. I did immediately know it was a scam becausejust by what it said in the body which was "oh you win 600,000 dollars", and I lookedat the reply-to address and it was some hotmail address, so yea pretty obvious. But I also looked and saw it said both signed-byand mailed-by erie.gov, and in the headers, all three checks passed. And yes I also checked for any weird characters,and nope they are all legit. So you might be wondering,
how this couldhave possibly happened? Well I looked up the person's name and apparentlythey're the sheriff of this town called Erie, and that's their site. So I have to assume the simplest explanation,which is the guy got his account phished or stolen somehow, and someone used it to sendout scam emails. And if the scammer hadn't made it so freakinobviously a scam, they probably could have gotten a lot of people. Just goes to show that no matter what yousee, some critical thinking is your last defense. Ok so now let me get into more detail aboutsome stuff you might see when checking these fields. I'm going to keep it simple for now, and afterwardsfor those of you who want to actually know how these checks specifically work can stickaround. First, SPF. This helps verify that the server sendingthe email with a particular domain address is authorized to do so. However, it's the easiest to spoof to passof the three, so a pass doesn't necessarily mean much, but a fail is definitely bad andnot to be trusted, that means it is in no way allowed to send that email. If you're wondering, "Wait, how are the securitytests spoofed", well I'll talk about that later. If it's neutral, it's basically the same asit not being enabled at all, which is just bad policy and also pretty suspicious. A softfail is the same as a fail and is highlysuspicious, and means the domain owner said 'even if this check fails, accept the emailsanyway'. It doesn't 100% mean it's fraudulent, andcould easily just be because the mail server is misconfigured, especially if they're usinga third party mailer service, but still don't trust it too much.
The only exception might be if there is alsoBOTH passing DKIM and DMARC records despite being a softfail. Next, DKIM. This tells you that the email has not beenaltered in transit, and was written by who it says it was. But again you still want to see DMARC withit, because yes it could be a passing DKIM record, but that record could be for a sitethat is not even matching the From domain. So it's not a 100% guarantee, though I willsay in my experience, it seems that DKIM spoofing is quite a bit rarer than SPF. But, you might see a lot that says fail andthey attempted to do it. But if you really want beyond a shadow ofa doubt, DMARC is what you have to look for. A pass technically should mean the email wasnot altered, and also will tell you who signed the message with an encrypted key. In gmail, it actually says "with domain" andthen the website. If you're using Gmail here is where you reallydo have an advantage because it allows you to easily see the true signer of an email. And with this information shown, you can sortof do a DMARC-like test yourself, by looking and seeing if the domain here is the sameas the one in the From sender. That's called 'alignment', that's also whatDMARC checks for, for both SPF and DKIM. However this is really important. If it fails, then don't even bother checkingif it matches, because that's faked anyway if it fails. Only bother checking for a match if it passes,because if it passes that means there was a legit signature somewhere, and you justwant to make sure that legit signature comes from the actual sender domain. In other words, if it passes, then yes youcan see the true signer of the email. But if it fails, that means they SAID theywere signing for that domain, but they failed, which means you can only know that that isNOT the domain it came from. And if you're not using Gmail and using aservice that doesn't show you all this information.
Then really you just have to rely on whetherthere's a DMARC record, and if there's not, then you don't necessarily want to trust itif it's suspicious. Now if it passes, but the domain is not thesame as the From address, and not an official site by the company, it means they sent avalid certificate, but it has nothing to do with the site it says as being from. And by the way, if the signing domain is notthe same as the From domain, whether fully legitimate and authorized or not, that's actuallywhen you see the 'via' thing show up in Gmail. But again that only happens if it's a valid,passing signature. Like in this example, the domain is obviouslyspoofed. But, because it failed the checks, Googledoesn't know where it came from, so it can't tell you, and it does not say 'via'. So do NOT assume that it isn't spoofed justbecause 'via' isn't there. You always want to make sure that there isan actual valid AND matching DKIM or SPF record. Next if you see fail, obviously don't trustit, because it means either the email was altered in transit somehow, or could be faked,and at best a bad configuration. 'None' means the sender didn't sign it, whichbasically means nothing. 'Policy' means it was signed, but not configuredin a way that is acceptable, so basically useless. '
Neutral' means it's either not signed orhad a syntax error. So really the only one you can trust is apass. so basically from my understanding, even ifthere is not a DMARC record, IF DKIM passes, and the signing domain is an official onefor the correct website, that should be fine, because that's the big thing DMARC checksfor, called alignment, which we can see here ourselves. Also be aware that a lot of big companieshave free email services that scammers can use to send out scam emails. For example, Microsoft, they have one throughOffice 365. And I believe that sends out one via "onmicrosoft.com". So if you see one that says "onmicrosoft.com",just know that's not really from Microsoft, someone could have set that up and sent outemails via that, and someone might say "oh well it's sent via Microsoft, it must be trustworthy",but NO. Anyone could have really done that, so don'tnecessarily trust it if it's not matching the domain that was sent. Speaking of DMARC, I kind of already justsaid what it does. It looks at the SPF and DKIM records, andmakes sure they were actually testing for the domain that is shown to the user in the'from' field, and not some other random domain. Because obviously it would be useless if ascam email claiming to be from Paypal.com goes out, but includes SPF and DKIM recordsfor 'scam.example.com', those two might pass, but have nothing to do with paypal.com. That's why DMARC is so critical.
Oh and by the way, those 'mailed-by' and 'signed-by'fields in the other gmail window basically correspond to the SPF and DKIM records aspassing. If DMARC passes, it means you can be prettydarn confident the email is at least not spoofed or faked, but again make sure you check the'from' address for any look alikes. But if it has DMARC and fails, I would behighly suspicious. It could be a bad configuration of the emailserver, or it could be a more sophisticated attack, like this one I actually found thatclaimed to be from the IMF, International Monetary Fund, but obviously wasn't. With this one you can see that the headersshow the SPF actually passes, but the DMARC fails. And on the email page, you can see it saysmailed-by and this "bouncev02" dot "inter-net" whatever this is. And here, "mailed-by" corresponds with theSPF record. But this is not IMF.org, this is some randomwebsite. That's why it says 'via' there. Therefore, obviously this SPF pass is actuallya pass of the "inter.net" domain, not the IMF. So they actually spoofed the headers to tellemail clients to check SPF for a domain that is not even the IMF. Luckily with this though, IMF does have DMARC,so we can see that it obviously is fake. But even if it didn't, now you can go lookand see if the 'mailed-by' or 'via' thing is there. And if it's another domain, especially ifit's looking suspicious, could definitely be a scam. So by now you should have a much better understandingof what you can look for if you come across an email that you suspect could be fake,
butmight not be very obvious on the surface. At this point you you'd only have to worryabout a situation where the company's servers or someone's email was hacked to send it out,which is obviously a possibility, but less likely. And now I'll go a bit more into detail abouthow exactly the different authentication records work. With SPF, that stands for "Sender Policy Framework". It is MEANT to specifically just check thatthe 'return path' in the header, aka the original sending server, is allowed to do so. You see, whenever an email is sent by anyone,it includes a bunch of info as you'd expect, like the email address and domain it's supposedlyfrom. But anyone can just code their email to say'uh yea I'm this person', so how can you tell? Well what a website can do, is create an SPFrecord in their public DNS records. These are visible to anyone who wants to lookthem up, and they also tell web browsers stuff like where their web server is. The SPF record basically say "only serverswith these specific IP addresses are authorized to send emails with my domain name on them."
So if you get an email from an email claimingto be from paypal.com, you, or your email program, can look at the DNS records Paypal.compublishes and see if the server this email came from is on that authorized list. If it matches, it's a pass, and if it fails,the website can either call it a 'fail' which tells you to reject any emails that do notmatch, or a softfail, where the website tells you "eh even if this doesn't match just acceptit anyway". Which is often used during testing, but kindof useless to keep on permanently. Next is DKIM, which stands for "DomainKeysIdentified Mail". This time in the website's DNS record, thereis a DKIM record containing a public encryption key that everyone can see, while the officialsending server keeps the private key that no one else can see. These encryption keys are created in a veryspecial way, such that the private key encrypts data that can only then be decrypted by thepublic key, and also the other way around, where the public key encrypts data that canthen only be decrypted by the private key. This is called public key encryption, andspecifically "assymetric encryption". So what happens is the sending server takesthe contents of the message before it sends it out, then 'hashes' the contents of themessage, generates a unique string. Now very quickly, hashing just uses an algorithmthat generates a unique string from some data, and ONLY that exact data will generate thatstring called a hash, and also, the same algorithm will always generate the same hash for thatsame data. It's just an easy way to tell if a file orsome data matches the original, without even having the original.
Now, the reason you have to encrypt the hash,is because a scammer could just hash some scam message and send it along. But, if the authorized server encrypts thehash with the official private key, then you as the recipient get the message and generatea hash of the message's contents. You then take the encrypted hash that wassent along with the email, and decrypt it using the public key published on the officialsite. If the hash you generated matches the oneyou decrypt that was sent along, you can now be certain of two things. First, that the message was not changed, andalso the website who's public key you used to decrypt it MUST be the true sender. Because the way the keys work, you know thatanything you can decrypt with your public key, MUST have been encrypted with the privatekey, that you know only the real website has. So it kind of does the job of SPF as well. Finally, how DMARC works, and it's easierthan DKIM trust me. DMARC stands for "Domain-based Message Authentication,Reporting, & Conformance". I sort of already touched on this before. But this is necessary because the major weaknessof both SPF and DKIM are, from my understanding, that someone could basically send along anSPF and DKIM record that has nothing to do with the email the human recipient sees asthe 'from address'. So people realized "wait a minute, we needto make sure SPF and DKIM are actually authenticating the address the user sees, which is basicallythe whole point". So if a website enables DMARC, which againis listed in the DNS records, it checks this, and also lets the website owner say what shouldbe done about emails that fail DMARC. The main policy options are to do nothing,quarantine or send to spam, or reject completely. There's also options for whether this appliesto subdomains or not. At this point you might be thinking, if wehave all these layers of security out there, why do we need to go through and check somuch stuff ourselves? Shouldn't all the spam get caught? Well no
Not at all. According the site spf-all.com which is trackingSPF statistics, of the 140 million domains they checked, 80% of those domains had noSPF record at all. And SPF record is usually considered the mostbasic bare minimum security. Now not every domain necessarily is used foremail, and the biggest sites definitely use it, but still. But here's more. Of the 20% that do have SPF, only 32% usethe strict method saying to outright reject failed matches. Another 33% use a policy that literally doesnothing and is the equivalent of not checking at all, and a further 33% use one that's 'softfail'which may or may not cause a rejection depending on their DMARC settings, if they even havethat. Oh and the last 1% have a record that explicitlysays "yea anyone can send emails on our behalf and you should accept all of them no matterwhat", which are all either terrible mistakes, or their goals are beyond my understanding,because that is literally giving anyone permission to impersonate your domain. Also, according to Data by a company calledFarsight, only about 2.7 Million domains use DMARC. That is a lot in absolute terms, but not comparedto how many domains are out there. If the other statistics are right, then thereare 26 million domains that have SPF records, so are presumably sending out emails, butonly about 10% of those use the authentication record that's the best. Ohyea , and of those that do have DMARC, morethan half don't even have an enforcement policy
which makes it almost pointless. So that should answer the question of "whybother checking yourself". While many websites have these records, thereare plenty that don't, and even many that do don't have enforcement policies to tellyour mailbox software to block failures. So then it's just up to your email software'sspam filtering capability. I guess the one good thing is that scammersare probably most likely to try and impersonate the biggest sites, which are also the mostlikely to have the most thorough security records in place. But by now you should hopefully never fallfor a spoof email again. Of course, even if the domain address turnsout to be legit, you better make sure you still know and trust the domain in the firstplace. That's all up to you though. So I hope you guys enjoyed the blog.

0 Comments