• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
    • NoSpamProxy 25Reports
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
    • Blog
    • Newsletter Subscription
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Was ist Spoofing

What is spoofing?

Stefan Feist | Technischer Redakteur
Author: Stefan FeistTechnical Writerhttps://www.linkedin.com/in/stefan-feist-23b257b0/–Connect on LinkedIn

Email spoofing is a particularly insidious form of cyberattack: the sender of an email is falsified in order to gain trust and deceive recipients. The consequences range from data theft and malware to financial damage. In this article, you will learn how spoofing works, why it is so dangerous – and how you can effectively protect yourself against it.

11.04.2025|zuletzt aktualisiert:11.08.2025

In email spoofing, the sender of an email is faked to give the impression that the message comes from a trustworthy source. The sender’s address is manipulated so that the email appears to come from a well-known company, authority or person known to the recipient, for example.

The SMTP information in the email header is relevant for email spoofing, especially the Header-From: It indicates the email address from which the message originates. For example, when you send an email, the email client automatically fills in this field with your email address, whereby the header-from contains not only the sender’s address but also the sender’s name. During spoofing, criminals change the details and insert a trustworthy sender address and a plausible sender name.

Spoofing is related to social engineering. In social engineering, human characteristics such as helpfulness, trust, fear or deference to authority are exploited to skilfully manipulate people. While social engineering uses emotions to persuade the recipient to carry out certain actions, spoofing creates the technical conditions to achieve the attacker’s objectives.

These goals include, for example, spying on account or access data, obtaining money or spreading malware.

How does mail spoofing work?

In email spoofing, an email is sent with a faked sender name or faked sender address without the attacker having access to the real email account. This is possible because every email has two From fields, the MAIL FROM field and the Header-From field. However, email clients only display the Header-From field. The attacker therefore exploits vulnerabilities in the email protocol (SMTP) to insert falsified sender information.

Email spoofing is possible in various ways. With the help of scripts or programming languages that support SMTP, spoofing can be easily automated.

For example, it is possible to set any sender address in PHP using the mail() function – and this is exactly what attackers abuse.

Here is an example:

$to = 'opfer@example.com';

$subject = 'Wichtige Nachricht';

$message = 'Bitte klicken Sie auf folgenden Link...';

$headers = "From: info@beispielbank.dern";

$headers .= "Reply-To: info@beispielbank.dern";

$headers .= "X-Mailer: PHP/" . phpversion();

mail($to, $subject, $message, $headers);

?>

Here it looks as if the mail was sent from info@example.de.

How do I recognise email spoofing?

Analyse the email header

  • "Received" lines

    Did the email come from an unexpected server?

  • "Return-Path" and "From"

    Do the senders match?

  • X-Mailer or X-Originating-IP

    Unusual? E.g. PHP for supposedly professional senders?

  • SPF, DKIM, DMARC

    Does it say ‘fail’ anywhere?

Be suspicious

This applies to unexpected emails, urgent or threatening emails or demands for money or data.

Check the sender’s address

View the full sender address. Look out for misspelled letters in the domain or domain additions.

Why is spoofing dangerous?

You think you would never fall for spoofing? Well, spoofing is so dangerous because it abuses trust, and that’s exactly what makes it so dangerous: financial damage, a ruined reputation or contamination by malware are just some of the possible consequences of a spoofing attack.

For example, an employee of automotive supplier Leoni AG received an email that purported to come from the Management Board. The sender’s address was forged and the email was in perfect German, with instructions to transfer a large sum of money to a foreign account.

Another case: attackers forged emails to the automotive supplier Toyota Boshoku that looked like internal payment instructions, allegedly from management. An employee in the finance department was persuaded to transfer money to an account that did not belong to Toyota, but to the criminals.

And even security experts like Troy Hunt are not safe from spoofing and have already fallen victim to criminals.

How can I protect myself against spoofing?

SMTP alone is not able to check the authenticity of an email. Emails with a forged ‘From’ line and a forged display name end up directly in your inbox. So how can you protect yourself?

In addition to options such as two-factor authentication (2FA) or the general advice not to open links or attachments from unknown senders, there are various technical measures you can take:

  • Sensitise employees

    Train your employees with courses that simulate real threat scenarios. This reduces the risk of them falling for spoofing or other attacks.

  • Check sender reputation

    Protect your email communication by systematically checking the trustworthiness of senders.

  • Detect and recognise CxO fraud

    Use appropriate software to check whether the first and last names of company users are being misused and whether domains like your own are being used by criminals.

  • Use anti-spoofing software

    Use a security solution that scans incoming emails and only allows messages that have been rated as secure.

  • Analyse metadata

    By analysing metadata, attack patterns can be recognised more quickly, and defended against more effectively.

  • Use an email firewall

    Use an email firewall as described in this article.

  • Use a content filter

    Use a filter that automatically converts Office or PDF attachments into low-risk PDF files, rule-based and without manual effort.

Not yet using NoSpamProxy?

With NoSpamProxy you can reliably protect your company from scamming attacks and benefit from many other security features. Request your free trial version now!

Get your free NoSpamProxy trial now
  • share 
  • share 
  • share 
  • email 

SEARCH

PRODUCT

  • All Topics
  • NoSpamProxy Cloud
  • NoSpamProxy Protection
  • NoSpamProxy Encryption
  • NospamProxy Large Files

You need support?

You can find more information about NoSpamProxy in our documentation and forum.

CATEGORY

  • All Topics
  • News
  • Product
  • Tech & Support
  • Events

NoSpamProxy Newsletter

Subscribe to Newsletter
RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

NoSpamProxy

  • NoSpamProxy Cloud
  • NoSpamProxy Encryption
  • NoSpamProxy Large Files
  • NoSpamProxy Disclaimer
  • Price request
  • Team
  • Career
  • General terms and conditions
  • Data Protection Information for Business Partners and Applicants
  • Cybersecurity (PSIRT)

Partners

  • Becoming a reseller
  • Partners
  • Order Certificates
  • Newsletter

Categories

  • All topics
  • News
  • Support
  • Updates
  • Order certificates

Latest News

  • NIS2 Network and Information Systems Directive Preview
    NIS2 – What the directive means for you (Update 2026)29.01.2026 - 10:38
  • Wie Cloaking Phishing-Angriffe tarnt 800x800
    How cloaking disguises phishing attacks23.01.2026 - 09:45
  • Gelöschter SPF-Eintrag: Warum DNS-Alarmierung unverzichtbar ist 800x800
    When the service provider deletes the SPF record: Why DNS alerts are essential16.01.2026 - 10:00
IMPRINT • EULA • Privacy Policy • • © 2026 Net at Work GmbH
  • Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
Link to: NoSpamProxy and Dropsuite form strategic partnership for enhanced email security, archiving and backup Link to: NoSpamProxy and Dropsuite form strategic partnership for enhanced email security, archiving and backup NoSpamProxy and Dropsuite form strategic partnership for enhanced email security,...NoSpamProxy-und-Dropsuite-schließen-strategische-Partnerschaft-Preview Link to: UPDATE: New Google email sender guidelines: What you need to do Link to: UPDATE: New Google email sender guidelines: What you need to do Info IconUPDATE: New Google email sender guidelines: What you need to do
Scroll to top Scroll to top Scroll to top