Sentrya logo Sentrya Get rid of spam

How Scam Emails Exploit Weaknesses in SMTP and Why It Is So Easy to Fake Emails

Added on: 31/01/2025 Email is one of the most widely used communication methods in the world, but it was designed in an era when security concerns were not a priority. This has led to a fundamental flaw in the way email works: it is incredibly easy to forge sender information, making it a powerful tool for scammers, spammers, and cybercriminals.


The Problem: Email Headers Are Not Secure


Most people assume that the “From” field in an email accurately represents the sender. However, due to the way the Simple Mail Transfer Protocol (SMTP) works, this is not necessarily true. SMTP is the protocol used to send emails, and it allows for the manipulation of sender and recipient information in a way that is not verified by default.

Here’s how SMTP operates when sending an email:
1. The sending mail server introduces itself with a HELO (or EHLO for extended SMTP).
2. A MAIL FROM command specifies the sender’s email address.
3. A RCPT TO command specifies the recipient(s).
4. A DATA command sends the actual email, including headers and body.


Why This is a Security Issue


SMTP does not enforce validation of sender information. The email headers—such as To, Cc, and From—are not actually used to direct email delivery. Instead, they are just cosmetic fields added for user convenience. The actual routing is handled separately by the MAIL FROM and RCPT TO commands, which are not necessarily the same as what appears in the visible email headers.

This means that a malicious actor can:
- Send an email with a fake “From” address—making it appear as though it came from a trusted source.
- Spoof the recipient fields—misleading users about who else received the email.
- Make phishing emails look completely legitimate—tricking users into clicking malicious links or providing sensitive information.


How Scammers Exploit This Weakness


Because SMTP does not verify sender identities, scammers and attackers can send emails that appear to come from legitimate companies, government agencies, or even a victim’s coworkers or friends. Here are some common scams that take advantage of this:
Phishing Attacks: Emails appearing to be from banks, PayPal, or other trusted institutions ask recipients to “verify” their information by entering credentials on a fake website.
Business Email Compromise (BEC): Attackers impersonate executives or managers, instructing employees to wire money or send confidential data.
Fake Support Emails: Cybercriminals pretend to be customer service representatives from major companies, tricking users into handing over their login credentials.
Extortion and Blackmail: Scammers send emails pretending to be law enforcement or hackers, demanding payment in cryptocurrency to avoid consequences.


Why Fixing This is Difficult


The biggest challenge in securing email is that it was designed as a decentralised system, meaning there is no single authority that controls email security globally. Implementing a security solution without breaking existing email infrastructure is difficult.

One possible solution would be for email clients to ignore unverified headers, but this would make email inconvenient because:
• Users would lose the ability to see who an email was addressed to.
• The “From” field might have to be removed entirely unless verified, which could disrupt email usability.

Because of these trade-offs, email providers continue to display headers even though they can be falsified.


Attempts to Fix Email Spoofing: SPF, DKIM, and DMARC


To improve email security, modern email services use a combination of three protocols:
1. SPF (Sender Policy Framework) – Allows domain owners to specify which mail servers are allowed to send emails on their behalf.
2. DKIM (DomainKeys Identified Mail) – Uses cryptographic signatures to verify that an email was not altered after being sent.
3. DMARC (Domain-based Message Authentication, Reporting & Conformance) – Builds on SPF and DKIM to allow domain owners to specify how to handle emails that fail authentication.

While these protocols help prevent domain-based spoofing, they do not verify the recipient fields (To, Cc) or fully prevent email impersonation.


How Users Can Protect Themselves


Because email spoofing remains a major issue, users need to be vigilant when handling emails:
1. Check the Email Headers
• Many email clients allow users to view “raw” email headers. If the “Return-Path” or “Received” headers do not match the “From” address, it could be a spoofed email.
2. Be Wary of Urgent Requests for Information
• Legitimate companies and banks will never ask for sensitive information via email.
3. Look for Authentication Indicators
• Major providers like Gmail and Outlook display indicators when an email is verified through SPF, DKIM, and DMARC.
4. Use Cryptographic Email Verification (PGP)
• Pretty Good Privacy (PGP) or S/MIME encryption can be used to digitally sign emails, ensuring they have not been tampered with.
5. Enable Two-Factor Authentication (2FA) on All Accounts
• Even if credentials are stolen, 2FA can prevent unauthorised access.


Email is inherently insecure when it comes to sender verification, and scammers continue to exploit this weakness to launch phishing and impersonation attacks. While security measures like SPF, DKIM, and DMARC help verify domain authenticity, they do not fully eliminate the risk of email spoofing.

Until email protocols are fundamentally redesigned, users must remain cautious and employ security best practices to avoid falling victim to these scams. Understanding the limitations of email security can help individuals and businesses better protect themselves against cyber threats.

Read more

Italy Data Protection Authority Blocks Chinese AI App DeepSeek Over Privacy Concerns

Italy’s Data Protection Authority, known as the Garante, has taken dec... Read more

Surveillance Pricing: How Your Data Influences Online Prices

In today’s digital marketplace, the prices you encounter online may be... Read more

UnitedHealth Confirms Massive Data Breach Affecting 190 Million Americans

In a significant cybersecurity incident, UnitedHealth Group has confir... Read more
Sentrya logo Sentrya
Affiliates Register Terms Privacy
Made with ❤️ by Claudiu All rights reserved | Sentrya 2025
I'd like to set analytics cookies that help me make improvements by measuring how you use the site.