When an email arrives with the 'From' and 'To' addresses being identical, it is generally a clear sign of email spoofing. Attackers deliberately manipulate the 'From' header, which is easily forged, to impersonate the recipient. This deceptive tactic is employed to bypass spam filters, create a false sense of legitimacy, or facilitate phishing and other fraudulent activities by making the email appear to be sent from the recipient to themselves. While 'From' and 'To' are display headers that can be arbitrarily set, they differ fundamentally from the 'MAIL FROM' and 'RCPT TO' commands, which are part of the underlying SMTP envelope governing email delivery. Consequently, security measures like DMARC, SPF, and DKIM are vital for detecting such spoofing by verifying the 'From' domain's authenticity. Although rare, a legitimate scenario for matching 'From' and 'To' addresses could arise from misconfigured auto-responders or forwarding loops, which represent configuration issues rather than malicious intent. However, in most instances, a matching 'From' and 'To' address should prompt immediate suspicion and scrutiny of the email's authenticity.
14 marketer opinions
An email arriving with identical 'From' and 'To' addresses is a pervasive sign of email spoofing, a deceptive practice where the sender's identity is forged. Attackers deliberately manipulate the 'From' field, which is easily altered, to make it appear as if the email originated from the recipient themselves. This tactic serves multiple malicious purposes: enhancing perceived legitimacy, bypassing spam filters, and setting the stage for phishing or other fraudulent schemes. It's important to remember that the visible 'From' and 'To' addresses are part of the email's display headers, distinct from the actual 'MAIL FROM' and 'RCPT TO' commands in the SMTP envelope that govern delivery. While email authentication protocols such as SPF, DKIM, and DMARC are critical in identifying these forgeries, the ease of header manipulation remains a challenge. Very rarely, a legitimate matching of these addresses can occur, typically stemming from misconfigured auto-responders or email forwarding loops, indicating a system error rather than malicious intent. Nevertheless, such a match should primarily be viewed with suspicion and trigger further investigation.
Marketer view
Email marketer from Email Geeks observes an email where the From and To addresses are exactly the same and asks if this indicates a spoofing attempt, providing the full email header for analysis.
15 Aug 2022 - Email Geeks
Marketer view
Email marketer from Email Geeks explains that the 'To:' header in an email is optional, and a recipient might be in BCC, receiving the email because of the SMTP command 'RCPT TO:'. He clarifies that 'HELO/EHLO', 'MAIL FROM', 'RCPT TO', and 'DATA' are the mandatory SMTP commands forming the email's envelope, while header fields like 'From:' and 'To:' are part of the message body and can be arbitrary. He adds that DKIM and DMARC make spoofing less trivial and confirms the 'Return-Path' header's value is derived from the 'MAIL FROM' command.
10 Mar 2023 - Email Geeks
2 expert opinions
When an email appears to be sent from one's own address, meaning the 'From' and 'To' fields are identical, it is a hallmark of email spoofing. This deception occurs because the 'From' header, which is visible to the recipient, is easily forged by malicious senders. Unlike the true envelope sender or 'Return-Path,' the display 'From' address can be freely manipulated to create a convincing, yet false, impression that the email originates from the recipient themselves. This tactic is a clear and common method used by attackers to gain trust, circumvent spam filters, and facilitate phishing or other fraudulent activities.
Expert view
Expert from Spam Resource explains that the 'Header From' address, which is what recipients see, can be easily spoofed and made distinct from the 'Return-Path' (envelope sender). This means an attacker can set the 'Header From' to match the recipient's own email address, appearing as if the email originated from them, which is a common type of spoofing attempt.
1 Sep 2024 - Spam Resource
Expert view
Expert from Word to the Wise shares that the 'From' header, which is visible to the email client user, can be freely manipulated or 'made up' by senders, unlike the 'Mail-From' (envelope sender/Return-Path). This allows malicious actors to set the 'From' address to match the 'To' address, creating a deceptive email that appears to be sent from the recipient to themselves, which is a clear indication of a spoofing attempt.
24 May 2024 - Word to the Wise
3 technical articles
While the 'From' and 'To' addresses in an email can technically match due to the independent nature of header fields, such an occurrence often signifies an email spoofing attempt. RFC 5322 clarifies that these display headers are separate from the SMTP envelope addresses, meaning the 'From' field can be arbitrarily set by the sender. Consequently, malicious actors exploit this flexibility to impersonate recipients, even within the same organization, a tactic known as 'intra-org spoofing'. Email security features like Exchange Online Protection (EOP) are specifically designed to combat these deceptive practices. Furthermore, robust authentication protocols such as DMARC are crucial; they help detect spoofing by verifying that the domain in the 'From' header aligns with the authenticated sending domain. A DMARC failure when the 'From' domain matches the 'To' domain's indicates a fraudulent claim of origin.
Technical article
Documentation from RFC 5322 - Internet Message Format explains that the 'From' field (author's address) and the 'To' field (primary recipient's address) are header fields. These fields are distinct from the envelope sender (MAIL FROM) and recipient (RCPT TO) used during SMTP transport. Because the header 'From' field can be set independently by the message originator, it is technically possible for it to match the 'To' address, whether legitimately or as part of a spoofing attempt.
31 Mar 2025 - RFC 5322 - Internet Message Format
Technical article
Documentation from Microsoft Learn explains that email security features, such as anti-spoofing protection in Exchange Online Protection (EOP), are designed to identify and block spoofed messages. This includes 'intra-org spoofing' where a sender tries to impersonate someone else within the same organization by setting the 'From' address to another internal user's address, even if that user is also the 'To' recipient, indicating a potential spoofing attempt.
29 Sep 2021 - Microsoft Learn
How can spammers send emails from real addresses, and is this a DMARC configuration issue?
How do I identify the source of email spoofing reports sent to spoof@ebay.com?
What are the different terms for email From addresses?
What could be the purpose of a spammer sending emails with invalid 'To' addresses and valid 'Return-Path' addresses?
Why does Gmail sometimes show the 5322.from email address instead of the From name?
Why would a customer receive an email intended for another customer with the wrong email in the TO field?