
Email Impersonation Using Lookalike Domains: How Attackers Copy Your Identity
Have you ever discovered that someone sent a message to your client using your name but from a suspicious email address like [email protected]
instead of your real one [email protected]
? This isn’t classic spoofing—it’s email impersonation using a lookalike domain, and it can be just as dangerous.
In this blog, we explain how attackers pull off this trick, why it works, and what you can do to protect your brand, your clients, and your communication.
How Attackers Copy Your Emails
There are a few common ways cybercriminals get access to your real email content:
- They compromise your client’s inbox.
- If your client was phished or hacked, the attacker can read your email exchanges.
- They copy a publicly forwarded or leaked email.
- If your client forwarded the email to someone else, and it got shared, the attacker could get a copy.
- They spoof your name using a different domain.
- Your name shows as the sender, but the actual address is different: e.g.,
Juan dela Cruz <[email protected]>
.
- Your name shows as the sender, but the actual address is different: e.g.,
- They set up a similar-looking domain like
juan.delacruz-.com
orjuandelacruz.co
, designed to trick recipients.
Is This Spoofing?
This is a form of impersonation, not traditional technical spoofing. Instead of forging the actual email headers of your domain, the attacker uses:
- A similar domain name
- Your display name
- Copied email content
Together, these tricks are highly convincing, especially to clients or partners who aren’t looking closely.
How to Protect Against Email Impersonation
Here are the most effective steps to protect your identity and reduce risk:
1. Educate Clients and Contacts
- Let them know that your official emails always come from your specific domain.
- Encourage them to verify the full email address before responding.
2. Register Similar Domain Names
- Protect your brand by purchasing lookalike domains that could be used maliciously.
3. Implement DMARC, SPF, and DKIM
- These don’t stop lookalike domains but prevent actual spoofing of your domain.
- They also help email providers identify legitimate senders.
4. Sign Your Emails with S/MIME or PGP
- Digitally signed emails help your recipients confirm the message wasn’t altered and that it’s truly from you.
5. Use a Security Footer or Disclaimer
- Add a footer like: “Official emails from [Your Company] come only from @yourdomain.com. Beware of impersonators.”
📆 In Summary
Email impersonation is a growing threat, and it doesn’t require advanced hacking—just clever deception. If someone sends your clients a real email you previously wrote, but from a fake address using your name, you need to act.
By implementing security protocols, registering lookalike domains, and educating your contacts, you can reduce the chances of impersonation harming your business or reputation.