Le 28/06/2016 à 16:13, David Jones a écrit :
From: RW <rwmailli...@googlemail.com>

That wont work in this example because nothing has actually been
spoofed.

...

All it takes is a compromised account on a trusted mail server (happens
all of the time) to provide a conduit for this type of phishing email.  Very
easy to do which is why we are going to see more and more of this.

Or, if your company is a worthwhile target, it is equally easy for the scammer to setup a lookalike domain and configure it with proper SPF, DKIM and the like. Who's going to notice that the message came from examp1e.com instead of example.com?

Theoretically, of course, custom SA rules could be written to detect such lookalikes, but even then, all it takes is for a scammer to have a slightly better imagination than the person writing the rules!

--
John

Reply via email to