Suped

Summary

Phishing emails can sometimes bypass SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) authentication checks, a perplexing scenario for many email senders and recipients. This occurs because these protocols primarily verify the technical aspects of the sender, such as the sending server's authorization (SPF) or the message's integrity and signing domain (DKIM), rather than definitively validating the legitimacy of the visible From address itself, especially if it's different from the authenticated domain.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers often face the perplexing situation where phishing emails manage to bypass standard authentication checks. This can lead to confusion and concern, as the very tools designed to protect their brand and recipients appear to have failed. Their experiences highlight the ongoing cat-and-mouse game between legitimate senders and malicious actors.

Marketer view

Marketer from Email Geeks expresses skepticism when receiving unexpected emails, even from reputable sources. It's surprising how convincing some of these phishing attempts can be initially.

1 Feb 2020 - Email Geeks

Marketer view

Marketer from Email Geeks expresses surprise that SPF, DKIM, and DMARC did not prevent a specific phishing email from reaching the inbox. This highlights a common misconception about the absolute protection these protocols offer.

1 Feb 2020 - Email Geeks

What the experts say

Email deliverability experts continually analyze the evolving landscape of phishing attacks, particularly those that bypass initial SPF and DKIM authentication. Their insights often delve into the technical nuances of how these protocols function, as well as the specific tactics malicious actors employ to exploit any existing gaps or misconfigurations. They consistently advocate for layered security measures.

Expert view

Expert from Email Geeks suggests that sophisticated phishing attacks often involve compromised legitimate accounts or subdomains, which then send emails that pass initial authentication checks. This makes detection much harder for recipients.

5 Feb 2020 - Email Geeks

Expert view

Expert from Email Geeks observes that attackers can register and configure their own domains with valid SPF and DKIM records to evade basic authentication checks. This strategy allows them to appear legitimate without compromising an existing domain.

6 Feb 2020 - Email Geeks

What the documentation says

Official documentation and technical specifications for SPF, DKIM, and DMARC meticulously outline how these protocols function and their intended scope. While these standards are powerful tools against email fraud, their specifications also implicitly highlight scenarios where their individual checks might be insufficient to stop every sophisticated phishing tactic, especially without the critical alignment capabilities of DMARC.

Technical article

Higher Logic documentation explains that SPF verifies the sending IP, ensuring it's authorized by the domain owner, while DKIM confirms message integrity and sender authorization via a cryptographic signature. These two work in tandem for foundational authentication.

15 Mar 2024 - Higher Logic

Technical article

TechTarget documentation describes how SPF, DKIM, and DMARC work together to combat spam, phishing, and email spoofing, with DMARC providing the crucial policy enforcement mechanism. It acts as the orchestrator of authentication outcomes.

20 Apr 2024 - TechTarget

11 resources

Start improving your email deliverability today

Get started