{"id":12488,"date":"2019-07-15T16:07:44","date_gmt":"2019-07-15T14:07:44","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/"},"modified":"2019-07-15T16:07:44","modified_gmt":"2019-07-15T14:07:44","slug":"email-spoofing","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/","title":{"rendered":"Email Spoofing"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">Have you ever had this unhealthy sensation of being accused of facts that do not concern you? To feel helpless in the face of an accusing mail, which, because of its imperative and accusing tone, has the gift of throwing us the opprobrium?<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">This is the purpose of this particular kind of sextortion mail that uses spoofing, to try to extort money from you. A message from a supposed &#8220;hacker&#8221; who claims to have hacked into your computer. He threatens you with publishing compromising images taken without your knowledge with your webcam and asks you for a ransom in virtual currency most of the time.<\/span><\/p>\n<p><!--more--><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">Something like that:<\/span><\/p>\n<p>&nbsp;<\/p>\n<blockquote class=\"\" style=\"color: #000000;font-family: -webkit-standard;font-style: normal;font-weight: normal;letter-spacing: normal;text-align: start;text-indent: 0px;text-transform: none;text-decoration: none\">\n<div class=\"\" style=\"margin: 0px\"><span class=\"\" style=\"font-family: -webkit-system-font, 'Helvetica Neue', Helvetica, sans-serif;color: #000000\"><b class=\"\">From:<span class=\"Apple-converted-space\">\u00a0<\/span><\/b><\/span><span class=\"\" style=\"font-family: -webkit-system-font, 'Helvetica Neue', Helvetica, sans-serif\">&lt;<a href=\"mailto:xxxxxxxxxx@dbi-services.com\"><span style=\"margin: 0px !important;padding: 0px !important;float: inherit !important;font-family: inherit !important;font-size: inherit !important;font-style: inherit !important;font-weight: inherit !important;line-height: inherit !important\">oneperson@dbi-services.com<\/span><\/a>&gt;<\/span><\/div>\n<div class=\"\" style=\"margin: 0px\"><span class=\"\" style=\"font-family: -webkit-system-font, 'Helvetica Neue', Helvetica, sans-serif;color: #000000\"><b class=\"\">Date:<span class=\"Apple-converted-space\">\u00a0<\/span><\/b><\/span> <span style=\"font-size: 12.0pt;font-family: 'Calibri',sans-serif;color: black\">Friday, 24 May 2019 at 09:19<\/span><span class=\"\" style=\"font-family: -webkit-system-font, 'Helvetica Neue', Helvetica, sans-serif\"> UTC+1<br class=\"\" \/><\/span><\/div>\n<div class=\"\" style=\"margin: 0px\"><span class=\"\" style=\"font-family: -webkit-system-font, 'Helvetica Neue', Helvetica, sans-serif;color: #000000\"><b class=\"\">To:<span class=\"Apple-converted-space\">\u00a0<\/span><\/b><\/span><span class=\"\" style=\"font-family: -webkit-system-font, 'Helvetica Neue', Helvetica, sans-serif\">&lt;<a href=\"mailto:oneperson@dbi-services.com\"><span style=\"margin: 0px !important;padding: 0px !important;float: inherit !important;font-family: inherit !important;font-size: inherit !important;font-style: inherit !important;font-weight: inherit !important;line-height: inherit !important\">oneperson@dbi-services.com<\/span><\/a>&gt;<br class=\"\" \/><\/span><\/div>\n<div><span class=\"\" style=\"font-family: -webkit-system-font, 'Helvetica Neue', Helvetica, sans-serif;color: #000000\"><b class=\"\">Subject: <\/b><\/span><span class=\"\" style=\"font-family: -webkit-system-font, 'Helvetica Neue', Helvetica, sans-serif\"><b class=\"\"><span style=\"margin: 0px !important;padding: 0px !important;float: inherit !important;font-family: inherit !important;font-size: inherit !important;font-style: inherit !important;font-weight: inherit !important;line-height: inherit !important\">oneperson<\/span><\/b><\/span><\/div>\n<div><\/div>\n<div class=\"\">\n<div class=\"\">Your account is hacked! Renew the pswd immediately!<br class=\"\" \/>You do not heard about me and you are definitely wondering why you&#8217;re receiving this particular electronic message, proper?<br class=\"\" \/>I&#8217;m ahacker who exploitedyour emailand digital devicesnot so long ago.<br class=\"\" \/>Do not waste your time and make an attempt to communicate with me or find me, it&#8217;s not possible, because I directed you a letter from YOUR own account that I&#8217;ve hacked.<br class=\"\" \/>I have started malware to the adult vids (porn) site and suppose that you watched this website to enjoy it (you understand what I mean).<br class=\"\" \/>Whilst you have been keeping an eye on films, your browser started out functioning like a RDP (Remote Control) that have a keylogger that gave me authority to access your desktop and camera.<br class=\"\" \/>Then, my softaquiredall data.<br class=\"\" \/>You have entered passcodes on the online resources you visited, I intercepted all of them.<br class=\"\" \/>Of course, you could possibly modify them, or perhaps already modified them.<br class=\"\" \/>But it really doesn&#8217;t matter, my app updates needed data regularly.<br class=\"\" \/>And what did I do?<br class=\"\" \/>I generated a reserve copy of every your system. Of all files and personal contacts.<br class=\"\" \/>I have managed to create dual-screen record. The 1 screen displays the clip that you were watching (you have a good taste, ha-ha&#8230;), and the second part reveals the recording from your own webcam.<br class=\"\" \/>What exactly must you do?<br class=\"\" \/>So, in my view, 1000 USD will be a reasonable amount of money for this little riddle. You will make the payment by bitcoins (if you don&#8217;t understand this, search \u201chow to purchase bitcoin\u201d in Google).<br class=\"\" \/>My bitcoin wallet address:<br class=\"\" \/>1816WoXDtSmAM9a4e3HhebDXP7DLkuaYAd<br class=\"\" \/>(It is cAsE sensitive, so copy and paste it).<br class=\"\" \/>Warning:<br class=\"\" \/>You will have 2 days to perform the payment. (I built in an exclusive pixel in this message, and at this time I understand that you&#8217;ve read through this email).<br class=\"\" \/>To monitorthe reading of a letterand the actionsin it, I utilizea Facebook pixel. Thanks to them. (Everything thatis usedfor the authorities may helpus.)<br class=\"\" \/><br class=\"\" \/>In the event I do not get bitcoins, I shall undoubtedly give your video to each of your contacts, along with family members, colleagues, etc?<\/div>\n<\/div>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">Users who are victims of these scams receive a message from a stranger who presents himself as a hacker. This alleged \u201chacker\u201d claims to have taken control of his victim&#8217;s computer following consultation of a pornographic site (or any other site that morality would condemn). The cybercriminal then announces having <b>compromising videos of the victim made with his webcam<\/b>. He threatens to publish them to the victim&#8217;s personal or even professional contacts if the victim does not pay him a ransom. This ransom, which ranges from a few hundred to several thousand dollars, is claimed in a virtual currency (usually in Bitcoin but not only).<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">To scare the victim even more, cybercriminals sometimes go so far as to <b>write to the victim with his or her own email address<\/b>, in order to make him or her believe that they have actually taken control of his or her account.<\/span><span style=\"font-size: 11.0pt\">\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">First of all, there is no need to be afraid of it. Indeed, if the &#8220;piracy&#8221; announced by cybercriminals is not in theory impossible to achieve, in practice, it remains technically complex and above all time-consuming to implement. Since scammers target their victims by the thousands, it can be deduced that they would not have the time to do what they claim to have done.<\/span><span style=\"font-size: 11.0pt\">\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span style=\"font-size: 11.0pt\">These messages are just an attempt at a scam<\/span><\/b><span style=\"font-size: 11.0pt\">. In other words, if you receive such a blackmail message and do not pay, nothing more will obviously happen.<\/span><span style=\"font-size: 11.0pt\">\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">Then, no need to change your email credentials. Your email address is usually something known and already circulates on the Internet because you use it regularly on different sites to identify and communicate. These sites have sometimes resold or exchanged their address files with different partners more or less scrupulous in marketing objectives.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">If <b>cybercriminals have finally written to you with your own email address<\/b> to make you believe that they have taken control of it: be aware that the sender&#8217;s address in a message is just a simple display that can very easily be usurped without having to have a lot of technical skills.<\/span><span style=\"font-size: 11.0pt\">\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">In any case, the way to go is simple: don&#8217;t panic, don&#8217;t answer, don&#8217;t pay, just throw this mail in the trash (and don&#8217;t forget to empty it regularly).<\/span><span style=\"font-size: 11.0pt\">\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">On the mail server side, setting up certain elements can help to prevent this kind of mail from spreading in the organization. This involves deploying the following measures on your mail server:<\/span><\/p>\n<ul>\n<li class=\"MsoListParagraphCxSpFirst\" style=\"text-align: justify;text-indent: -18.0pt\"><span style=\"font-size: 11.0pt\">&#8211;<span style=\"font: 7.0pt 'Times New Roman'\"> \u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><b><span style=\"font-size: 11.0pt\">SPF (Sender Policy Framework)<\/span><\/b><span style=\"font-size: 11.0pt\">: This is a standard for verifying the domain name of the sender of an email (standardized in RFC 7208 [1]). The adoption of this standard is likely to reduce spam. It is based on the SMTP (Simple Mail Transfer Protocol) which does not provide a sender verification mechanism. SPF aims to reduce the possibility of spoofing by publishing a record in the DNS (Domain Name Server) indicating which IP addresses are allowed or forbidden to send mail for the domain in question. <\/span><\/li>\n<li class=\"MsoListParagraphCxSpMiddle\" style=\"text-align: justify;text-indent: -18.0pt\"><span style=\"font-size: 11.0pt\">&#8211;<span style=\"font: 7.0pt 'Times New Roman'\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><b><span style=\"font-size: 11.0pt\">DKIM (DomainKeys Identified Mail)<\/span><\/b><span style=\"font-size: 11.0pt\">: This is a reliable authentication standard for the domain name of the sender of an email that provides effective protection against spam and phishing (standardized in RFC 6376 [2]). DKIM works by cryptographic signature, verifies the authenticity of the sending domain and also guarantees the integrity of the message.<\/span><\/li>\n<li class=\"MsoListParagraphCxSpLast\" style=\"text-align: justify;text-indent: -18.0pt\"><span style=\"font-size: 11.0pt\">&#8211;<span style=\"font: 7.0pt 'Times New Roman'\"> \u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><b><span style=\"font-size: 11.0pt\">DMARC (Domain-based Message Authentication, Reporting and Conformance)<\/span><\/b><span style=\"font-size: 11.0pt\">: This is a technical specification to help reduce email misuse by providing a solution for deploying and monitoring authentication issues (standardized in RFC 7489 [3]). DMARC standardizes the way how recipients perform email authentication using SPF and DKIM mechanisms.<\/span><\/li>\n<\/ul>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 11.0pt\">REFERENCES<\/span><\/p>\n<p>[1] <span style=\"font-size: 11.0pt\">S. Kitterman, \u201cSender Policy Framework (SPF),\u201d ser. RFC7208, 2014, <a href=\"https:\/\/tools.ietf.org\/html\/rfc7208\">https:\/\/tools.ietf.org\/html\/rfc7208<\/a><\/span><\/p>\n<p>[2] <span style=\"font-size: 11.0pt\">D. Crocker, T. Hansen, M. Kucherawy, \u201cDomainKeys Identified Mail (DKIM) Signatures\u201d ser. RFC6376, 2011, \u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc6376\">https:\/\/tools.ietf.org\/html\/rfc6376<\/a><\/span><\/p>\n<p>[3] <span style=\"font-size: 11.0pt\">M. Kuchewary, E. Zwicky, \u201cDomain-based Message Authentication, Reporting and Conformance (DMARC)\u201d, ser. RFC7489, 2015, <a href=\"https:\/\/tools.ietf.org\/html\/rfc7489\">https:\/\/tools.ietf.org\/html\/rfc7489<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever had this unhealthy sensation of being accused of facts that do not concern you? To feel helpless in the face of an accusing mail, which, because of its imperative and accusing tone, has the gift of throwing us the opprobrium? This is the purpose of this particular kind of sextortion mail that [&hellip;]<\/p>\n","protected":false},"author":41,"featured_media":12489,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[149],"tags":[1598,25],"type_dbi":[],"class_list":["post-12488","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Email Spoofing - dbi Blog<\/title>\n<meta name=\"description\" content=\"Email spoofing, cybersecurity, good practices, email routing\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Spoofing\" \/>\n<meta property=\"og:description\" content=\"Email spoofing, cybersecurity, good practices, email routing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-15T14:07:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/spoofing2-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1918\" \/>\n\t<meta property=\"og:image:height\" content=\"1140\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dominique Althuser\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dominique Althuser\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/\"},\"author\":{\"name\":\"Dominique Althuser\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e073bb260858b43d90f60db95530d553\"},\"headline\":\"Email Spoofing\",\"datePublished\":\"2019-07-15T14:07:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/\"},\"wordCount\":1145,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/spoofing2-1.png\",\"keywords\":[\"Cybersecurity\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/\",\"name\":\"Email Spoofing - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/spoofing2-1.png\",\"datePublished\":\"2019-07-15T14:07:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e073bb260858b43d90f60db95530d553\"},\"description\":\"Email spoofing, cybersecurity, good practices, email routing\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#primaryimage\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/spoofing2-1.png\",\"contentUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/spoofing2-1.png\",\"width\":1918,\"height\":1140},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dbi-services.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email Spoofing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e073bb260858b43d90f60db95530d553\",\"name\":\"Dominique Althuser\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/4a90c4fe27cc68659d997bc361ef3b93b776f079e35122d3ce6bedcc68083dae?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4a90c4fe27cc68659d997bc361ef3b93b776f079e35122d3ce6bedcc68083dae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4a90c4fe27cc68659d997bc361ef3b93b776f079e35122d3ce6bedcc68083dae?s=96&d=mm&r=g\",\"caption\":\"Dominique Althuser\"},\"url\":\"https:\/\/www.dbi-services.com\/blog\/author\/dom\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Email Spoofing - dbi Blog","description":"Email spoofing, cybersecurity, good practices, email routing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/","og_locale":"en_US","og_type":"article","og_title":"Email Spoofing","og_description":"Email spoofing, cybersecurity, good practices, email routing","og_url":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/","og_site_name":"dbi Blog","article_published_time":"2019-07-15T14:07:44+00:00","og_image":[{"width":1918,"height":1140,"url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/spoofing2-1.png","type":"image\/png"}],"author":"Dominique Althuser","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dominique Althuser","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/"},"author":{"name":"Dominique Althuser","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e073bb260858b43d90f60db95530d553"},"headline":"Email Spoofing","datePublished":"2019-07-15T14:07:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/"},"wordCount":1145,"commentCount":0,"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/spoofing2-1.png","keywords":["Cybersecurity","Security"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/","url":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/","name":"Email Spoofing - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#primaryimage"},"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/spoofing2-1.png","datePublished":"2019-07-15T14:07:44+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e073bb260858b43d90f60db95530d553"},"description":"Email spoofing, cybersecurity, good practices, email routing","breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/email-spoofing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#primaryimage","url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/spoofing2-1.png","contentUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/spoofing2-1.png","width":1918,"height":1140},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/email-spoofing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Email Spoofing"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e073bb260858b43d90f60db95530d553","name":"Dominique Althuser","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4a90c4fe27cc68659d997bc361ef3b93b776f079e35122d3ce6bedcc68083dae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4a90c4fe27cc68659d997bc361ef3b93b776f079e35122d3ce6bedcc68083dae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a90c4fe27cc68659d997bc361ef3b93b776f079e35122d3ce6bedcc68083dae?s=96&d=mm&r=g","caption":"Dominique Althuser"},"url":"https:\/\/www.dbi-services.com\/blog\/author\/dom\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/12488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=12488"}],"version-history":[{"count":0,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/12488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media\/12489"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=12488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=12488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=12488"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=12488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}