Suped

Does DMARC prevent phishing attacks that use different domains?

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a critical standard for email security. It's designed to protect your domain from being used in fraudulent emails, like phishing attempts. However, a common point of confusion is the extent of its protection. Specifically, does it stop phishing attacks that use different, or lookalike, domains? The short answer is no, it doesn't, but understanding the nuance here is key to building a robust security strategy.

DMARC's power lies in its ability to prevent one specific, yet very common, type of attack: direct domain spoofing. This is when an attacker sends an email that appears to come directly from your domain, for example, billing@yourcompany.com, when it actually originated from a malicious server.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What DMARC actually protects against

DMARC works by creating a policy in your DNS records that tells receiving mail servers what to do with emails claiming to be from your domain that fail authentication checks. It leverages two other email authentication protocols, SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail), to verify that an email is legitimate. If an email fails these checks, your DMARC policy can instruct the receiver to monitor, quarantine, or reject the message entirely.

thehackernews.com logo
The Hacker News says:
Visit website
DMARC can help minimize direct-domain spoofing attempts, which indirectly also cuts down on phishing attacks perpetrated via spoofed company domains.

By implementing a strict DMARC policy, you effectively prevent unauthorized parties from sending emails that impersonate your exact domain. This closes a huge loophole that phishers have historically exploited. It stops them from using your own trusted brand name against your customers, partners, and employees in this direct way.

The limits of DMARC: cousin and lookalike domains

The crucial limitation of DMARC is that it only applies to the exact domain it is configured for. It has no authority over other domains, even if they look very similar to yours. This is where attackers pivot their strategy. If they can't spoof yourcompany.com, they will register a new, malicious domain that is visually deceptive. This is often called a 'cousin domain' or 'lookalike domain' attack.

Examples of lookalike domains include:

  • Typosquatting: Using a common misspelling, like yourcompanny.com.
  • Homographs: Swapping characters with ones that look identical, such as a capital 'I' for a lowercase 'l'.
  • Subdomain trickery: Adding keywords like security-yourcompany.com or yourcompany.support.com.

Since the attacker owns and controls this new domain, they can set up perfectly valid SPF, DKIM, and even DMARC records for it. When they send a phishing email from user@yourcompanny.com, it will pass all the technical authentication checks. Your DMARC policy for yourcompany.com is irrelevant because it's a completely different domain.

www.dmarc-record.com logo
www.www.dmarc-record.com says:
Visit website
DMARC is only used to protect against direct domain spoofing. If the owners / operators of examplewebsite.com use DMARC to protect this domain, it will not protect against cousin domains (look-a-like domains).
www.hornetsecurity.com logo
Hornetsecurity – Next-Gen Microsoft 365 Security says:
Visit website
DMARC is the standard in spoofing protection, but it’s limited to blocking exact domain spoofing and doesn’t have an answer for cousin domains and display name spoofing.

Why DMARC is still an essential security layer

Despite this limitation, DMARC is not optional, it is a foundational element of email security. By implementing DMARC, you are forcing attackers to use tactics that are inherently weaker and easier to spot. An email from a slightly misspelled domain is much more likely to raise suspicion with an alert user than an email that appears to come from your legitimate domain.

As noted by Bitsight, companies can use DMARC to essentially eliminate direct domain impersonation. This protects your brand reputation and maintains trust with your customers. Furthermore, having a DMARC policy is becoming a requirement for good email deliverability, ensuring your legitimate emails don't get incorrectly flagged as spam by providers like Google and Yahoo.

To truly protect against the broader phishing threat, DMARC must be part of a multi-layered strategy that includes:

  • User training: Educating users to always verify the sender's email address and be skeptical of unexpected requests.
  • Defensive domain registration: Proactively buying common misspellings and variations of your primary domain.
  • Full domain portfolio protection: Implementing DMARC reject policies on all of your domains, especially parked or non-sending ones, to prevent them from being hijacked for phishing campaigns.

In conclusion, DMARC is an indispensable tool that stops direct domain spoofing cold. It does not, however, prevent phishing attacks from different or lookalike domains. Think of it as the strong front door lock on your house. It won't stop someone from trying to trick you from across the street, but you should absolutely still have it locked.

Start improving your email deliverability today

Get started