Phishing emails can bypass SPF and DKIM authentication checks through a variety of means. SPF and DKIM verify the origin of an email, not its content or intent, so if a phisher controls the sending domain and properly configures SPF/DKIM records, uses a compromised account, leverages 'internal phishing' within an organization, or employs look-alike domains, the emails can pass authentication. DMARC can help, but its absence or misconfiguration, as well as a poor domain reputation, can further enable successful phishing attacks. Essentially, authentication alone is insufficient for preventing phishing; broader security measures are necessary.
9 marketer opinions
Phishing emails can bypass SPF and DKIM authentication checks through several methods. These include the phisher controlling the sending domain and correctly configuring SPF and DKIM, compromising a legitimate email account, using 'internal phishing' from within an organization where SPF and DKIM pass, or utilizing look-alike domains. While SPF and DKIM authenticate the sender's legitimacy, they don't verify the email's content or intent. The absence of DMARC or its improper configuration also contributes to successful phishing attacks.
Marketer view
Marketer from Email Geeks shares the authentication results showing DKIM and SPF passed.
31 May 2023 - Email Geeks
Marketer view
Email marketer from Proofpoint explains that impersonation attacks work by sending a message that appears to be from someone the recipient knows or trusts. To maximize the chance that the message will be acted on, attackers register domains very similar to those of well-known brands. This allows them to bypass traditional email authentication controls such as SPF, DKIM and DMARC.
7 Dec 2023 - Proofpoint
2 expert opinions
Phishing emails can bypass SPF and DKIM authentication because these mechanisms primarily verify the origin of the email, not its content or intent. A phisher can compromise legitimate accounts or utilize look-alike domains with proper SPF and DKIM configurations to send emails that pass authentication. Domain reputation also plays a role; a good reputation increases the likelihood of emails passing through, whereas a bad reputation, especially without proper authentication setup, can cause emails to fail.
Expert view
Expert from Word to the Wise (Laura Atkins) explains that Domain Reputation can be a factor with authentication. If you have set everything up correctly, SPF, DKIM, DMARC, etc., and have a good reputation, the likelihood is that you'll go through but if you don't have the above set up, and you have a bad reputation, the email will likely fail.
10 Mar 2023 - Word to the Wise
Expert view
Expert from Spam Resource (John Levine) explains that SPF and DKIM only authenticate the origin of the email, not the content or intent. A phisher who compromises a legitimate email account or uses a look-alike domain with properly configured SPF and DKIM can send emails that pass authentication checks, even if the content is malicious.
7 Jan 2025 - Spam Resource
3 technical articles
Phishing emails can bypass SPF and DKIM checks because these authentication methods primarily verify the sender's authorization to send emails on behalf of a domain, not the content or intent of the email itself. This can occur when a phisher uses an authorized server, compromises a legitimate account, or gains control of a sender's email system. While DMARC can help mitigate the impact, it cannot completely prevent such attacks when legitimate systems are compromised.
Technical article
Documentation from DMARC.org answers that if a phisher gains control of a legitimate sender's email system, they can send emails that pass SPF and DKIM because they're using the actual authorized infrastructure. DMARC can help mitigate the impact, but it can't completely prevent it if the original systems are compromised.
12 May 2024 - DMARC.org
Technical article
Documentation from Microsoft Learn explains that phishing emails can pass authentication if a compromised account is used to send the email. Since the email is technically coming from the legitimate account, it passes SPF/DKIM/DMARC checks, making it difficult to detect based on authentication alone.
18 May 2023 - Microsoft Learn
Can a competitor damage my domain reputation by sending spam with links to my site?
Can email signatures, especially via Exclaimer, cause SPF or DKIM failures and impact email delivery?
Do Yahoo and Gmail require DMARC authentication for senders?
How can email senders and users prevent and identify phishing emails?
How can I prevent brand and sender profile impersonation in emails and what actions can I take?
How can I use DMARC to prevent spammers from using my domain?
How can normal people identify phishing emails when services rewrite headers?
How do bounces and phishing attacks affect email deliverability and domain reputation?