I Received a Scam Email From My Own Domain, Here’s How to Stop It
I received a scam email from my own domain. Here's what happened and how you can protect your domain from email spoofing.
I received a scam email from my own domain. Here's what happened and how you can protect your domain from email spoofing.
Email spoofing is when an attacker forges the "From" address of an email to make it appear as if it was sent from a trusted source, even your own domain.
A few months ago, I received an email from [email protected]. It looked urgent. It claimed my domain was at risk and required immediate action. It felt something was wrong, because the only mail box I have there is mine, and it is not admin. But it looked like it came from my own domain.
After looking closely in the headers of the email and parsing the records, I found the real sending server. The attacker simply forged the From field. No access to my mailbox, so it wasn't "hacked", just spoofed.
Recently, the same happened to a friend. He runs an online store, and is not technical enough to understand, he panicked and clicked the link, but something didn't seem right so he did not go through with it and instead contacted me. We sat down and found out that it was the exact same scam.
Given how common this is, I decided to write and record it for my own, and anyone else who may be interested.
Because your domain reputation is at stake.
If attackers spoof your domain:
And yes — even if your email password is strong, spoofing can still happen if your DNS isn’t properly configured.
When properly secured:
1. Configure SPF (Sender Policy Framework)
Add a TXT record specifying which mail servers are allowed to send emails for your domain.
Example:
"v=spf1 include:spf.privateemail.com -all"
This tells receiving servers which senders are legitimate, in my case privateemail.com, yours may be different.
2. Enable DKIM (DomainKeys Identified Mail) DKIM cryptographically signs your emails.
Your email provider usually generates:
This ensures email integrity.
3. Set Up DMARC (Domain-based Message Authentication, Reporting & Conformance) This is the enforcement layer.
Start with monitoring mode:
NOTE: rua stands for Reporting URI for Aggregate reports, the email you have added will receive periodic email updates.
v=DMARC1; p=none; rua=mailto:[email protected]
Once confident, enforce it:
v=DMARC1; p=quarantine; rua=mailto:[email protected]
Eventually:
v=DMARC1; p=reject; sp=reject; adkim=s; aspf=s; rua=mailto:[email protected]
This tells receiving servers what to do when SPF/DKIM fail.
Reject means: drop the spoofed email.
That’s what you want.
You want:
If SPF check fails? Check if your email provider is properly included.
If DKIM is still missing? Make sure you have enabled it from your mail provider dashboard.
DMARC Too Strict?
Start with p=none, observe reports, then tighten policy.
Email spoofing doesn’t require your password, just a weak DNS setup. Lock down SPF, DKIM, and DMARC properly, and you protect not just yourself, but everyone who trusts your domain.