Phishing (Phishing)
Why Phishing Matters
Phishing is consistently the most common initial attack vector for security breaches. Attackers target employees, customers, and website visitors using emails that impersonate the organization. A phishing email from what appears to be your domain damages your brand trust even if your systems were not compromised.
Email authentication (SPF, DKIM, DMARC) is the primary technical defense against email-based phishing that spoofs your domain. When your domain has DMARC with p=reject, receiving servers block emails that fail authentication, preventing most domain-spoofing phishing attacks from reaching inboxes.
Beyond email authentication, protecting your users from phishing requires HTTPS (so users can verify they are on your real site), clear communication channels (so users know how you will contact them), and security awareness. Google Safe Browsing and domain reputation monitoring can alert you if your domain or lookalike domains are flagged for phishing.
Testing Your Configuration
Check your domain's email authentication with a DNS health checker (SPF, DKIM, DMARC). Monitor Google Safe Browsing status and domain reputation. Use Certificate Transparency logs to detect phishing sites using certificates for lookalike domains.
Real-World Example
In 2020, the Twitter Bitcoin scam compromised high-profile accounts (Barack Obama, Elon Musk, Apple) through a phone-based spear phishing attack targeting Twitter employees. Attackers used social engineering to obtain internal tool credentials, then posted cryptocurrency scam messages from verified accounts, collecting over $100,000 in Bitcoin within hours.