Client Ignoring Evidence of Targeted Spoofing Attacks

July 17, 2025

DMARC reports revealed thousands of phishing emails, yet the client continues to ignore security recommendations and enforce policies.

Client Ignoring Evidence of Targeted Spoofing Attacks

We currently have a client who is under a targeted spoofing attack. Although the client had never reported issues with fraudulent emails originating from their domain, after implementing the DMARC policy sending reports to URIports, we identified 1,224 and 5,166 phishing emails being distributed to Yahoo users through the Google infrastructure.

While the incident was reported the day after the first attack occurred and appropriate recommendations were provided, our insights were not taken seriously and were subsequently ignored.

Following the second incident, the client received several angry responses from victims, which provided further evidence of the problem. It has now been nearly a week since the incident, and the client still isn't convinced that DMARC enforcement and additional security measures are necessary.

In our experience, this is only the second case where a client ignored a spoofing issue - previously involving just a few hundred spoofed emails. This situation highlights that many business owners either don't believe or don't want to believe they can be targeted, even when clear evidence is presented.

Some of our clients even suspect that we are behind the threats, saying "We didn’t have this issue before you made changes to our DNS," despite the fact that they never had a DMARC protocol in place to begin with.

It's frustrating. How do you handle stuff like these?

Related posts
All posts
Coordinated Subdomain Takeover Campaign Targeting US Universities

Attackers are hijacking abandoned .edu subdomains via orphaned CNAME records, serving spam under trusted university domains and exploiting SEO authority.

Coordinated Subdomain Takeover Campaign Targeting US Universities
Cloudflare's DMARC Documentation Exposed an Unregistered Domain And Dozens of Organizations Paid the Price

How an unregistered domain in Cloudflare's DMARC documentation silently exposed infrastructure data from dozens of organizations.

Cloudflare's DMARC Documentation Exposed an Unregistered Domain And Dozens of Organizations Paid the Price
FinTech AccessPay Exposed Internal Email Infrastructure Data for Years

A misconfigured DMARC record sent sensitive email infrastructure data to an unregistered domain, creating a long-term exposure risk.

FinTech AccessPay Exposed Internal Email Infrastructure Data for Years