Email remains the primary attack vector for ransomware, phishing, and Business Email Compromise — year after year, despite decades of awareness campaigns. The data from 2025 is unambiguous: more than 90% of ransomware and advanced persistent threat (APT) attacks begin with a malicious email. The FBI's Internet Crime Complaint Center documented BEC losses exceeding $2.9 billion. The average cost of a phishing-related data breach reached $4.88 million in 2025.

Best practices
following industry standards reduces deliverability failures 80%
Data-driven
measuring before and after every change is essential
ISP feedback
use Postmaster Tools, SNDS, and FBL data to guide decisions
Iterative
email deliverability is never a one-time fix — it requires ongoing monitoring

The reason email attacks persist despite their visibility is structural: the most effective defenses (SPF, DKIM, DMARC at p=reject) are technically available to every organization but adoption remains incomplete. According to Q2 2025 analysis, only about 18% of the world's 10 million most-visited domains publish a valid DMARC record, and just 4% enforce p=reject. The tools that prevent domain spoofing exist. Most organizations simply haven't deployed them.

This guide covers the technical defenses that actually work, the attack types they're designed against, and the implementation details that determine whether your organization is genuinely protected or just technically compliant.

Understanding the Attack Surface: What Email-Based Threats Look Like in 2025

Email-based attacks in 2025 fall into distinct categories that each require different defenses. Understanding the category determines which controls are effective:

Domain Spoofing

The attacker sends email that shows your domain in the From header that recipients see, but the message originates from infrastructure the attacker controls. Without DMARC p=reject, this works — a well-crafted email appearing to come from ceo@yourcompany.com can be sent by anyone.

DMARC p=reject effectively eliminates domain spoofing for the overwhelming majority of attacks. When a receiving server checks DMARC and finds p=reject, messages that fail the alignment check are rejected before they reach any inbox. The attacker cannot use your domain for phishing if receiving servers are enforcing your DMARC policy.

Lookalike Domain Attacks

The attacker registers a domain visually similar to yours (yourcompany.com → yourcomapny.com, yourсompany.com with Cyrillic characters, your-company.com, yourcompanyllc.com) and sends from that domain. These messages pass all authentication checks because they're legitimately sent from the registered domain.

DMARC does not protect against lookalike domain attacks. The defense requires: (1) proactive monitoring of newly registered domains similar to yours, (2) BIMI implementation that makes your verified logo appear in supporting mail clients — recipients who see your logo when legitimate email arrives will notice its absence in a lookalike attack, and (3) user training on exact domain verification.

Business Email Compromise (Account Takeover)

The attacker compromises a legitimate email account (typically through credential phishing or password stuffing) and uses it to conduct fraud from inside the organization or from a trusted vendor. All authentication passes because the message is genuinely sent from the legitimate account.

This is the hardest attack type to defend against at the email infrastructure level because the email is technically legitimate. Required defenses: MFA on all email accounts (the single most effective control against account takeover), anomaly detection that flags unusual sending behavior, and process controls that require out-of-band verification for financial transactions regardless of the apparent sender.

Vendor Email Compromise

Rather than attacking your organization directly, the attacker compromises a trusted vendor's email account and uses that existing trust relationship to request payment changes, invoice modifications, or credential disclosure. The email comes from a domain you've had legitimate business relationships with for years.

Defense requires process controls, not technical controls. Any request involving financial transactions — wire transfer instructions, banking detail changes, payment method updates — must be verified through a separate, pre-established out-of-band channel (phone call to a known number, not a number provided in the email). This process control applies regardless of how trusted the sender appears.

SPF, DKIM, DMARC: The Technical Defense Stack

The technical defenses against domain spoofing work as a layered stack where each protocol addresses a different part of the verification problem:

SPF: Authorizing Sending Infrastructure

SPF answers: "Was this message sent from a server I've authorized to send on behalf of my domain?" When a receiving server gets a connection from your IP, it checks your SPF record and verifies the IP is listed. An attacker's server — which you haven't authorized — generates an SPF fail.

SPF's limitation: it checks the SMTP envelope sender (the technical return-path), not the visible From header. A sophisticated spammer can pass SPF by using their own domain in the envelope while showing your domain in the visible From header. This is where DMARC alignment closes the gap.

DKIM: Cryptographic Message Integrity

DKIM answers: "Was this message signed by someone controlling the private key for my domain's DKIM keys, and has it been modified since signing?" The DKIM signature is mathematically tied to the message content and the signing domain. Forging a DKIM signature without the private key is computationally infeasible.

DKIM's limitation: it proves the message was sent by someone with the private key, but doesn't prove the sender is who the recipient thinks they are. It also doesn't protect against replay attacks (resending a legitimately signed message in a different context). DMARC alignment solves the first limitation.

DMARC: Alignment and Policy Enforcement

DMARC answers: "Does the domain that was authenticated by SPF or DKIM align with the From header domain the recipient sees, and what should the receiving server do when it doesn't?" This is the critical layer that makes SPF and DKIM actually protect against the visible-From-header spoofing that makes phishing effective.

The authentication flow for every incoming message:

  1. Receiving server checks SPF against the SMTP envelope sender domain
  2. Receiving server verifies DKIM signature against the d= signing domain in headers
  3. DMARC evaluates: does the envelope-from domain (SPF) or the d= domain (DKIM) match the organization domain of the visible From header?
  4. If alignment passes: message delivers normally
  5. If alignment fails: applying your DMARC policy (none = deliver, quarantine = spam folder, reject = rejected)

The aggregate reporting system (rua) provides daily XML reports showing every IP that's sending mail claiming your domain — including spoofing attempts. This visibility turns DMARC into both an enforcement mechanism and a threat intelligence feed.

Deploying DMARC p=reject: The Only Defense That Actually Blocks Domain Spoofing

DMARC at p=none monitors but doesn't block. DMARC at p=quarantine catches some spoofed mail in spam folders but doesn't prevent it from reaching the organization. Only p=reject provides genuine protection: spoofed messages are rejected at SMTP, never reach inboxes, and cannot generate spam complaints or extract information from confused recipients.

The deployment process requires careful sequencing to avoid blocking legitimate mail from misconfigured sources:

PhasePolicyDurationGoal
Discoveryp=none2–4 weeksCollect all sending sources via rua reports
Authenticationp=none4–8 weeksConfigure DKIM/SPF for all legitimate sources
Soft enforcementp=quarantine; pct=101–2 weeksCatch missed sources before full enforcement
Full quarantinep=quarantine2–4 weeksAll failing mail to spam; final cleanup
Soft rejectionp=reject; pct=101 weekBegin rejection with safety buffer
Full enforcementp=rejectPermanentAll domain spoofing rejected

Organizations that maintain p=none indefinitely often believe they're "monitoring DMARC" but aren't actually protected. A DMARC record at p=none is better than no DMARC (it provides visibility), but it's not a security control — it's a reconnaissance tool. The protection only happens at p=quarantine and p=reject.

BIMI: Brand Indicators for Message Identification

BIMI is the authentication layer that adds your verified brand logo to email in Gmail and Apple Mail. It doesn't improve deliverability directly, but it creates a visible trust signal: recipients who expect to see your logo will immediately notice its absence in a lookalike domain attack.

BIMI requirements: DMARC at p=quarantine or p=reject, a properly formatted SVG logo (square, solid background, HTTPS-hosted), and for Gmail — a Verified Mark Certificate (VMC) from an authorized mark verifier (Entrust or DigiCert). VMCs cost approximately €1,000–€1,500 annually and require proof of trademark ownership.

BIMI adoption is growing: Gmail, Yahoo, Apple Mail, and Fastmail support BIMI. For organizations with established brands, BIMI's user-visible protection against lookalike attacks is increasingly worth the VMC investment. Apple Mail's implementation doesn't require a VMC — logos appear for well-authenticated senders even without a Verified Mark Certificate.

ARC: Authenticated Received Chain for Forwarding and Mailing Lists

Email forwarding breaks DMARC alignment because the forwarding server's IP isn't authorized in the original sender's SPF record, and DKIM signatures may fail if the forwarding server modifies the message. ARC (Authenticated Received Chain) solves this by allowing intermediate servers to record the authentication results they observed before forwarding.

ARC is particularly important for:

  • Organizations with significant email forwarding (users who forward work email to personal accounts)
  • Mailing list operators whose messages get forwarded
  • Organizations receiving mail via security gateways that re-inject mail

Gmail, Microsoft, and Yahoo all support ARC evaluation. Google's 2024 bulk sender requirements explicitly recommend that forwarding services implement ARC headers. If your organization uses email forwarding and has seen DMARC failures from forwarded messages, ARC configuration on the forwarding infrastructure is the fix.

The Threat DMARC Doesn't Stop — And What Does

DMARC p=reject eliminates domain spoofing. It does not eliminate:

  • Lookalike domain attacks — requires domain monitoring and BIMI
  • Account takeover BEC — requires MFA and anomaly detection
  • Vendor compromise attacks — requires process controls (out-of-band verification)
  • Malicious content from legitimate senders — requires email security gateway (Proofpoint, Mimecast, Microsoft Defender for Office 365) with content inspection
  • AI-generated spear phishing — increasingly sophisticated AI-crafted personalized phishing has shorter detection windows; requires user training and behavioral email security analysis

The 2025 data from PowerDMARC's phishing statistics report notes that AI is now enabling cybercriminals to generate sophisticated phishing emails in as little as 5 minutes, and attackers are using AI for target research, message generation, and campaign automation at a scale previously requiring significant human effort. Technical authentication controls remain effective against spoofing, but the sophistication of non-spoofing attacks (lookalike domains, account takeover, highly personalized spear phishing) requires complementary controls.

The complete email security stack for 2025 includes: DMARC p=reject for domain spoofing prevention, BIMI for brand verification, MFA for account takeover prevention, domain monitoring for lookalike domain detection, and an email security gateway for content-level threat detection. Authentication alone is necessary but not sufficient.

Dedicated Email Infrastructure That Works

Stop fighting deliverability issues from shared infrastructure. Our dedicated IP environments come with managed warm-up, blacklist monitoring, and postmaster support — so your email reaches the inbox.

Explore Infrastructure Plans
Marek Novák

Email Security Engineer at Cloud Server for Email. Specialises in anti-phishing controls, DMARC enforcement, abuse pattern analysis, and domain spoofing prevention.

Last updated: March 20, 2026