Email Spoofing – Are You Who You Say You Are?



It's amazing that in this day and age, with our tech-infused lives, the most effective cyber attacks rely on the oldest tricks in the book. Take spoofing, for example, which is the tech equivalent of putting on a disguise to trick people into thinking you're someone else.

According to the handy Cybersecurity to English Dictionary, spoofing conceals the true source of electronic information by impersonation. Email spoofing is often used to bypass security filters by pretending the source is from a trusted location. It's a key component of the millions of phishing emails sent to users daily in efforts to steal their sensitive or company information.

Unfortunately, it’s pretty easy for malicious hackers to spoof email addresses. This is possible because the SMTP (simple mail transfer protocol) that is used to send and receive emails does not check the sender's authenticity. Cyberattackers can simply change the sender's address in an email to look like the message was sent from someone the user trusts. For example, the sender might seem to come from a coworker, let's say John Smith, whose email address is johnsmith@domainname.com. However, if you check the sender's actual user domain, you might see johnsmith22.34@domainname123.com. This is a clear clue that you're looking at a spoofed email that should be deleted or forwarded to a phish reporting tool.

As phishing emails become more sophisticated, users should follow basic security measures when sifting through emails. Take a look at 6 tips BIT has to offer.


Though we can't stop data thieves from trying to hack our information, that doesn’t mean we have to let them win. Vigilance is key to thwarting cyberattackers.

If you need more information and tips on email spoofing, contact BIT today. We are happy to help with your cybersecurity training. 


Providing RESOURCES. Creating COMMUNICATION. Sharing SUCCESS.