{"id":376,"date":"2021-03-15T10:00:34","date_gmt":"2021-03-15T10:00:34","guid":{"rendered":"https:\/\/prodmarc.com\/blog\/?p=376"},"modified":"2022-07-28T06:22:44","modified_gmt":"2022-07-28T06:22:44","slug":"dmarc-email-authentication-techniques-to-filter-out-phishing-emails","status":"publish","type":"post","link":"https:\/\/testblog.prodmarc.com\/index.php\/2021\/03\/15\/dmarc-email-authentication-techniques-to-filter-out-phishing-emails\/","title":{"rendered":"How can DMARC prevent the misuse of your domain?"},"content":{"rendered":"\n\n\n<figure class=\"wp-block-image size-large\"><img src=\"http:\/\/localhost\/blogs\/wordpress\/wp-content\/uploads\/2021\/03\/prodmarc-blogimg2-1.png\" alt=\"\" class=\"wp-image-377\"\/><\/figure>\n\n\n\n<p>The ability to create fake emails has long been used by cybercriminals as a tool for the deployment of spam, phishing attacks, or malware, and has been so since email was invented. DMARC is an easy way to give an email recipient the opportunity to verify an email&#8217;s validity with additional security that makes it easier to recognize.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><span style=\"font-weight: 400;\">It is understood that cybercriminals copy well-known brands and use the trusted reputation of the brand to send emails to recipients and orchestrate an impostor. The offenders end up giving away confidential data such as credit card pins, passwords or even end up making payments to the impostors.<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4><strong>What is DMARC?<\/strong><\/h4>\n\n\n\n<p><span style=\"font-weight: 400;\"><strong>DMARC (Domain-based Message Authentication, Reporting &amp; Conformance)<\/strong> is an email protection service that enables the identification and prevention of email spoofing. The aim of DMARC is to wage war on<strong> email phishing scams<\/strong>, where the address of the sender has been forged to look as if it came from a legitimate organization.<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4><strong>How does DMARC protect your domain emails?<\/strong><\/h4>\n\n\n\n<p><span style=\"font-weight: 400;\">For an organization that sends emails to its customers, DMARC guarantees that valid emails are authenticated and the identity of the sender is checked by the email service provider of the recipients. Fraudulent emails that tend to be originating from domains under the jurisdiction of the company are blocked. In its <strong>DMARC policy<\/strong>, the organization can also include domains that do not send emails or even defensively registered domains.<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><span style=\"font-weight: 400;\">Inbound emails that fail <strong>DMARC authentication<\/strong> do not enter the inbox of the recipient, so <strong>phishing emails<\/strong> are filtered out. So, if you get an Income Tax Department email with a &#8220;From&#8221; address with intimations@cpc.gov.in, did cpc.gov.in really approve the message?<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><span style=\"font-weight: 400;\">DMARC is built on two existing and widely deployed email authentication techniques, the Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM).<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><span style=\"font-weight: 400;\"><strong>SPF-<\/strong> enables domain owners to approve hosts who can use the &#8220;MAIL FROM&#8221; or &#8220;HELLO&#8221; identifier with their domain name. A list of hosts that are permitted to use a specific domain name is published as a specially formatted TXT record in the Domain Name System (DNS) records of that domain.<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><span style=\"font-weight: 400;\"><strong>DKIM<\/strong>&#8211; allows a digital signature for a domain owner tag and email message. Email authentication is performed using the public key of the signer, which is published in the DNS. A valid signature ensures that, since the signature was attached, at least some parts of the email have not been changed.<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><span style=\"font-weight: 400;\">While SPF and DKIM helped identify fake emails, neither of these protocols included a way to report what and why messages were denied. DMARC addresses this issue by enabling domain owners to tag sent messages to prove validity with certain domain identifiers.<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><span style=\"font-weight: 400;\">It provides instructions for receiving email servers on how to deal with messages that fail authentication tests for SPF and DKIM; and also provides a reporting system to convey what activities were taken under the policies.<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4><strong>Benefits of DMARC<\/strong><\/h4>\n\n\n\n<p><span style=\"font-weight: 400;\">What separates DMARC from other protocols for email authentication is its reporting feature. You can see who sends emails on behalf of your domain, your brand, with DMARC, and stop spammers from using it to send fake emails.<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><span style=\"font-weight: 400;\">DMARC&#8217;s reporting function means that receivers activated by DMARC can tell you:<\/span><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul><li>How many messages they\u2019ve received using your domains in the From address<\/li><li>Where the messages come from<\/li><li>If they passed DKIM and SPF tests on these messages<\/li><\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4><strong>Other advantages:<\/strong><\/h4>\n\n\n\n<ul><li>Before <strong>DMARC<\/strong>, receiving email servers did their best to decide whether or not the email was legitimate. It was never perfect and users had to search for lost emails in spam folders.<\/li><li>DMARC offers visibility dealing with messages that fail to authenticate.<\/li><li>By preventing unauthorized hosts from sending mail on your domain&#8217;s behalf, publishing a <strong>DMARC record<\/strong> protects your brand.<\/li><li>Valid emails are easily recognized after setting up your DMARC Record. This means you can advise all recipients to reject emails from anyone who imitates your business. This was DMARC&#8217;s original goal-to stop domain harassment.<\/li><li><strong>DMARC reports <\/strong>give you an insight into who is sending mail from your domain.<\/li><\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>It is easier to decide that the messages are not bad for inbox providers. Such emails are more likely to be sent easily and without errors to the recipient&#8217;s mail. Setting up a DMARC policy and finding the best service provider to deliver your emails would only help improve the credibility of your company.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4><strong>Conclusion<\/strong><\/h4>\n\n\n\n<p>We at ProGIST suggest getting a well-implemented<strong> DMARC setup <\/strong>to avoid emails reaching end-users who spoof your domain. This is a highly successful way to avoid the sending of both general phishing emails to your customers and spear phishing emails to your employees.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a href=\"https:\/\/www.prodmarc.com\/\"><strong>ProDMARC <\/strong><\/a>hand holds you during the entire life cycle of implementing DMARC including domains that do not send emails or even defensively registered domains. We study your outbound email traffic trend including marketing communications sent by third-party email campaign tools, by configuring SPF and DKIM records in your DNS for all your domains and configuring the DMARC record in your DNS with the right policies from the \u201cmonitoring\u201d to \u201cblocking\u201d modes. <a href=\"https:\/\/www.progist.net\/contact.html\">Contact<\/a> our experts for advanced cyber security solutions for your business.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The ability to create fake emails has long been used by cybercriminals as a tool for the deployment of spam, phishing attacks, or malware, and has been so since email was invented. DMARC is an easy way to give an email recipient the opportunity to verify an email&#8217;s validity with additional security that makes it [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":886,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_mi_skip_tracking":false},"categories":[1],"tags":[15,19,26,33,34,40,49],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/posts\/376"}],"collection":[{"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/comments?post=376"}],"version-history":[{"count":1,"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/posts\/376\/revisions"}],"predecessor-version":[{"id":951,"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/posts\/376\/revisions\/951"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/media\/886"}],"wp:attachment":[{"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/media?parent=376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/categories?post=376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/testblog.prodmarc.com\/index.php\/wp-json\/wp\/v2\/tags?post=376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}