• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 101
  • Last Modified:

Email spoofing

Dear Experts,
My client has regular pop3 email boxes from Godaddy, which recently have been spoofed.  Basically, someone is sending emails using their email addresses requesting payments or loans.  I changed their passwords, scanned their machines, and am pretty sure these emails are not coming from my clients' PCs.  After I spoke to Godaddy, they recommended I switch to Office 365 email boxes because of encryption.
What I am skeptical about is, if all they are using is the email addresses that they know exist, how does encryption of the email stop this type of spoofing?  It feels as though someone just saw my name on the website, and decided to use that name to register for something.
Unless my name itself is encrypted, I cannot stop that person from impersonating me, so why does encrypted email stop spoofing?
Please advise.
0
yballan
Asked:
yballan
3 Solutions
 
JohnBusiness Consultant (Owner)Commented:
Your regular POP Mail should be using Port 995 in and 587 out both of which encrypt the transmission.

Your email (and millions of others) are harvested from places where your name exists.

Most internet sites now hide this, but once they have your email address and name they will spoof all the time. The only thing anyone can do (aside from changing their email) is for everyone to have top notch spam filtering. Sadly many people do not bother.

I see spoofed names and false emails that I recognize in my spam quarantine. Real email from these same people do not land in the quarantine.
0
 
Tom CieslikIT EngineerCommented:
Very simple.
GoDaddy has installed security key verification like DKIM or other on their Office365 and this key is compared to their DNS. SO no one can duplicate settings and send emails from different server pretending is coming from GoDaddy.

This settings can only be implemented on ActiveSynch servers and can;t on old pop3 servers.

I think in your case someone just duplicated your pop3 settings and modified his header to looks like legit email from pop server from Godaddy.
That's why email it looks like legit.

If you going to move to ActiveSynch server you'll be safe
0
 
JohnBusiness Consultant (Owner)Commented:
That is what spam filtering does and none of this stuff lands in my inbox.
0
How do you know if your security is working?

Protecting your business doesn’t have to mean sifting through endless alerts and notifications. With WatchGuard Total Security Suite, you can feel confident that your business is secure, meaning you can get back to the things that have been sitting on your to-do list.

 
Adam BrownSr Solutions ArchitectCommented:
Moving to o365, in itself, won't stop spoofing. It will, however, net godaddy significant commissions on your licensing.

You also may not be getting spoofed. If the credentials for any of the godaddy accounts are compromised, they can be used to send email legitimately. So make sure your passwords are secure.

Moving to o365 will, however, give you better security controls. Multi  factor authentication helps limit unauthorized use. Dkim and spf provide methods for recipients to verify that emails are sent from you and not spoofed. Pop and imap don't allow these.

For info, godaddy o365 is not different than Microsoft's o365. It is just o365 with godaddy providing tech support.
0
 
Mal OsborneAlpha GeekCommented:
It is not possible to prevent random users from  sending email purported to be for any particular email address. Cannot be done.

What you can and should do, is set up at least an SPF record, preferably DMARK and DKIM as well. Running email without a properly set up SPF record in 2017 means you are pretty much guaranteed to be spoofed like this.

If you have an SPF record set up for your domain, then it will let receiving email servers check that the email was actually sent from your mail server. Most large mail services will do this, and either outright reject, or regard with suspicion anything that does not match the SPF record.

Crooks can still spoof an SPF protected email address, however little of the resultant spam will get through, so they nearly always use addresses with no SPF protection.

More on SPF here: https://en.wikipedia.org/wiki/Sender_Policy_Framework
1
 
David FavorLinux/LXD/WordPress/Hosting SavantCommented:
As Mal said, anyone can forge a from address.

Setting up correct SPF records allows receiving machines to block spam originating from incorrect (random Bot) sources.

And SPF records only work on receiving machines which correctly process + enforce SPF record data.

Mucking about with mail setups is incredibly simple, if you know how to do complete every step correctly + then test every step using tools like https://dmarcian.com provides.

If this is your first time debugging a problem like this, hire someone who does this all the time + have them run a video recorder to capture what they're doing + have them annotate the video. Then you may be able to do this yourself, next time around.
0
 
yballanAuthor Commented:
Dear Experts,

Thank you for very well rounded advises/insights to this problem.
I will get SPF records, this has been a great education for such wide spread problem.

I really appreciate your comments.
0
 
JohnBusiness Consultant (Owner)Commented:
You are very welcome and I was happy to help
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Protect Your Employees from Wi-Fi Threats

As Wi-Fi growth and popularity continues to climb, not everyone understands the risks that come with connecting to public Wi-Fi or even offering Wi-Fi to employees, visitors and guests. Download the resource kit to make sure your safe wherever business takes you!

Tackle projects and never again get stuck behind a technical roadblock.
Join Now