How a Single DMARC Misconfiguration Can Trigger an Email-Based DDoS

August 6, 2025

Misconfigured DMARC RUA with wildcard EDV enables attackers to trigger spam bombing, overwhelming inboxes and infrastructure with legitimate reports.

How a Single DMARC Misconfiguration Can Trigger an Email-Based DDoS

How a single DMARC misconfiguration can be exploited to launch an email-based DDoS attack.

Many companies want to receive DMARC reports for all their subsidiaries in one centralized email account. They often use a wildcard EDV record instead of defining an explicit hostname, which creates a high-risk entry point.

Exploit:

- today, 5,000+ mail servers send DMARC aggregate reports

- if an attacker registers a throwaway domain and sets its DMARC RUA to a wildcard EDV-enabled domain, reports are redirected to your internal mailbox

- one email sent per server = 5,000 reports the next day

- 10 throwaway domains = 50,000 inbound emails per day

- they loop it

- all reports come from trusted companies with authenticated domains: Google, Microsoft, Yahoo, etc.

This is real email-based DDoS aka spam bombing. It causes:

- server slowdowns

- missed legitimate emails

- team inboxes flooded with junk

- engineering resources wasted on mitigation and cleanup

- organizations running out of cloud storage

Fix:

- never use a wildcard EDV record for your main domain

- always define specific hostnames that you control

- ensure your infrastructure can’t be co-opted into someone else’s feedback loop

.DMARC is a good and incredibly helpful standard but there are still many ways it can be turned against companies.

Watch your DMARC.

Related posts
All posts
Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise

A scam email sent from @google.com passed SPF, DKIM, and DMARC without a compromised account. Here’s what it reveals about modern email threats.

Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise
When Vendors Control Your DNS: A Hidden DMARC Security Risk

A real-world example of how third-party DNS control can silently block DMARC visibility, redirect domain telemetry, and introduce serious email security and data exposure risks.

When Vendors Control Your DNS: A Hidden DMARC Security Risk
2.3 million emails. One exposed API key. $10K bill.

How DMARC forensics exposed an API key leak, 2.3M unauthorized emails, and a $10K bill.

2.3 million emails. One exposed API key. $10K bill.