Why DMARC, SPF, and DKIM Don't Protect Against Lookalike Domains
The Email Authentication Stack
If you manage email security for your clients, you have almost certainly deployed SPF, DKIM, and DMARC. These three protocols form the backbone of email authentication, and configuring them correctly is an essential part of any security baseline. Here is what each one does:
SPF (Sender Policy Framework) publishes a DNS record listing which mail servers are authorized to send email on behalf of a domain. When a receiving server gets an email claiming to be from acmecorp.com, it checks the SPF record to verify the sending server is authorized.
DKIM (DomainKeys Identified Mail) adds a cryptographic signature to outgoing emails. The receiving server can verify that the message was not altered in transit and that it was signed by a key associated with the sending domain.
DMARC (Domain-based Message Authentication, Reporting, and Conformance) ties SPF and DKIM together with a policy. It tells receiving servers what to do when an email fails authentication — report it, quarantine it, or reject it. DMARC also provides reporting so domain owners can see who is sending email using their domain name.
Together, these three protocols are highly effective at preventing unauthorized use of your client's exact domain. If an attacker tries to send an email with a forged From: [email protected] header from their own mail server, SPF will fail, DKIM will fail, and DMARC will instruct the receiving server to reject or quarantine the message.
The Blind Spot
Here is the problem: SPF, DKIM, and DMARC only protect the domain they are configured on. They verify that an email claiming to be from acmecorp.com actually came from acmecorp.com's authorized infrastructure. They say nothing about emails from acrnecorp.com, acmecorp.co, or acmec0rp.com.
When an attacker registers a lookalike domain, they control that domain completely. They can set up their own SPF record, generate their own DKIM keys, and publish their own DMARC policy. An email from [email protected] will pass every authentication check because it was legitimately sent from the infrastructure authorized for acrnecorp.com. The email is authentic — it is just not from who the recipient thinks it is from.
This is the fundamental gap. DMARC answers the question "did this email really come from the domain in the From header?" It does not answer "is this domain the one the recipient should trust?"
Why This Matters for MSPs
As an MSP, you have likely had the conversation with clients about deploying DMARC. You may have set it up, monitored the reports, and moved the policy from p=none to p=reject. That is important work and it protects your clients from direct domain spoofing.
But when you present that DMARC deployment as "email impersonation protection," you are leaving a significant gap uncovered. An attacker who wants to impersonate your client does not need to spoof their exact domain. They just need to register something close enough that a busy employee will not notice the difference.
Consider these scenarios:
- An attacker registers
acmecorp-billing.comand sends invoices to your client's customers with updated payment details. - A lookalike domain
acrnecorp.comsends an email to the finance team asking them to process an urgent wire transfer, appearing to come from the CEO. - A domain
acmecorp.cohosts a login page that mirrors the real company portal, capturing employee credentials.
In every case, SPF passes. DKIM passes. DMARC passes. The email is delivered to the inbox with no warnings because, from a protocol perspective, everything is legitimate.
Filling the Gap with Domain Monitoring
The defense against lookalike domains requires a fundamentally different approach. Instead of verifying the authenticity of incoming email, you need to monitor the domain registration landscape for new domains that resemble your clients' brands.
Domain monitoring continuously scans for permutations of protected domains — typos, homoglyphs, TLD variations, hyphenated versions, and more. When a new registration is detected, it is analyzed for threat indicators: Does it have MX records configured? Is it hosting web content? Does the content resemble your client's site? Has it obtained an SSL certificate?
This intelligence gives you the ability to act before an attack reaches your clients. A newly registered lookalike domain with MX records and a cloned login page is a clear threat that can be addressed through a takedown request to the registrar, a preemptive client alert, or both.
A Complete Email Security Story
SPF, DKIM, and DMARC remain essential. They protect your clients' domains from being directly spoofed. But they are only half of the email impersonation defense. Domain monitoring covers the other half — the lookalike domains that bypass authentication entirely because they are not pretending to be the real domain. They are pretending to be close enough.
For MSPs building a comprehensive security offering, domain monitoring is the natural complement to the email authentication stack you have already deployed. It turns a partial defense into a complete one and gives you a concrete, reportable metric to share with clients: the number of lookalike domains detected, assessed, and neutralized on their behalf.
Protect your clients from domain impersonation
Start monitoring for lookalike domains with a free 7-day trial.
Start Free Trial