How a Single DMARC Misconfiguration Can Trigger an Email-Based DDoS

August 6, 2025

Misconfigured DMARC RUA with wildcard EDV enables attackers to trigger spam bombing, overwhelming inboxes and infrastructure with legitimate reports.

How a Single DMARC Misconfiguration Can Trigger an Email-Based DDoS

How a single DMARC misconfiguration can be exploited to launch an email-based DDoS attack.

Many companies want to receive DMARC reports for all their subsidiaries in one centralized email account. They often use a wildcard EDV record instead of defining an explicit hostname, which creates a high-risk entry point.

Exploit:

- today, 5,000+ mail servers send DMARC aggregate reports

- if an attacker registers a throwaway domain and sets its DMARC RUA to a wildcard EDV-enabled domain, reports are redirected to your internal mailbox

- one email sent per server = 5,000 reports the next day

- 10 throwaway domains = 50,000 inbound emails per day

- they loop it

- all reports come from trusted companies with authenticated domains: Google, Microsoft, Yahoo, etc.

This is real email-based DDoS aka spam bombing. It causes:

- server slowdowns

- missed legitimate emails

- team inboxes flooded with junk

- engineering resources wasted on mitigation and cleanup

- organizations running out of cloud storage

Fix:

- never use a wildcard EDV record for your main domain

- always define specific hostnames that you control

- ensure your infrastructure can’t be co-opted into someone else’s feedback loop

.DMARC is a good and incredibly helpful standard but there are still many ways it can be turned against companies.

Watch your DMARC.

Related posts
All posts
Coordinated Subdomain Takeover Campaign Targeting US Universities

Attackers are hijacking abandoned .edu subdomains via orphaned CNAME records, serving spam under trusted university domains and exploiting SEO authority.

Coordinated Subdomain Takeover Campaign Targeting US Universities
Cloudflare's DMARC Documentation Exposed an Unregistered Domain And Dozens of Organizations Paid the Price

How an unregistered domain in Cloudflare's DMARC documentation silently exposed infrastructure data from dozens of organizations.

Cloudflare's DMARC Documentation Exposed an Unregistered Domain And Dozens of Organizations Paid the Price
FinTech AccessPay Exposed Internal Email Infrastructure Data for Years

A misconfigured DMARC record sent sensitive email infrastructure data to an unregistered domain, creating a long-term exposure risk.

FinTech AccessPay Exposed Internal Email Infrastructure Data for Years