{"id":89899,"date":"2019-09-26T09:00:28","date_gmt":"2019-09-26T16:00:28","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89899"},"modified":"2023-05-26T15:09:44","modified_gmt":"2023-05-26T22:09:44","slug":"how-to-prevent-phishing-attacks-dmarc-office-365","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/09\/26\/how-to-prevent-phishing-attacks-dmarc-office-365\/","title":{"rendered":"How to prevent phishing attacks that target your customers with DMARC and Office 365"},"content":{"rendered":"
This blog post is part of the Microsoft Intelligence Security Association (MISA) guest blog series<\/a>. To learn more about MISA, visit the MISA webpage<\/a>.<\/em><\/p>\n You already know that email is the number one attack vector for cybercriminals. But what you might not know is that without a standard email security protocol called Domain Message Authentication, Reporting, and Conformance (DMARC<\/a>), your organization is open to the phishing attacks that target your customers, crater your email deliverability rates, and crush your email-based revenue streams.<\/p>\n For all the utility of email, which remains the ultimate app for business collaboration and communication, it does have a serious flaw: the ability for a bad actor to pretend to be someone else in an email message. This can be done through one of two attack techniques, spoofing and impersonation. Spoofing is when the sender is attempting to send mail from, or on behalf of, the exact target domain. Impersonation is when the sender if attempting to send mail that is a lookalike, or visually similar, to a targeted domain, targeted user, or targeted brand. When cybercriminals hijack your brand identity, especially your legitimate domains, the phishing attacks they launch against your customers, marketing prospects, and other businesses and consumers can be catastrophic for them\u2014and your business.<\/p>\n Email-based brand spoofing and impersonations surged 250 percent in 2018, with consumers now losing $172 billion<\/a> to these and other internet scams on an annual basis. More than 90 percent of businesses<\/a> have been hit by such impersonations, with average losses from successful attacks now standing at $2 million<\/a>\u2014with an additional $7.9 million <\/a>in costs when they result in a data breach.<\/p>\n DMARC can help you take control of who can send email messages on your behalf, eliminating the ability for cybercriminals to use your domain to send their illegitimate messages. In addition to blocking fake messages from reaching customers, it helps prevent your business-to-business customers from partner invoice scams like the kind that recently defrauded one large, publicly traded business that lost $45 million<\/a>. Not a good look for your brand, and a sure way to lose your customers, partners, and brand reputation.<\/p>\n But to protect your corporate domains and prevent executive spoofing of your employees, DMARC must be implemented properly across all your domains and subdomains. And you’ll want your supply chain to do the same to protect your company and partners from such scams. Today, 50 percent of attacks involve \u201cisland hopping<\/a>,\u201d spoofing or impersonating one trusted organization to attack another within the same business ecosystem.<\/p>\n For those not yet familiar with the term, DMARC acts as the policy layer for email authentication technologies already widely in use\u2014including Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM).<\/p>\n At its most essential, DMARC gives organizations control over who is allowed to send emails on their behalf. It allows email receiver systems to recognize when an email is not coming from a specific brand’s approved domains\u2014and gives guidance to the receiver about what to do with those unauthenticated email messages. DMARC with a p=quarantine<\/em> or p=reject <\/em>policy is required to block those illegitimate email messages from ever reaching their targets.<\/p>\n Today, 57 percent of consumer email<\/a> in industries such as healthcare and retail are now fraudulent. Consumer-focused brand impersonations are up 11 times<\/a> in the last five years, 80 percent involving email. In 2018, the IC3 received 20,373 BEC\/E-mail Account Compromise (EAC) complaints with adjusted losses of over $1.2 billion<\/a>.\u00a0Those attacks target your accounting, payroll, and HR departments, so your outbound marketing programs can become toxic to recipients, obliterating your outbound email programs and the revenue they generate.<\/p>\n As the vast majority of businesses continue to migrate to capable and robust cloud platforms such as Office 365, a new generation of cybercriminal organizations is rapidly innovating its methods to find nefarious new ways to circumvent the considerable security controls built into these platforms. Unfortunately, some organizations may not realize that they should fully implement DMARC to augment the security benefit of Office 365 email authentication.<\/p>\n Microsoft has implemented support for DMARC across all of its email platforms. This means that when someone sends an email to a Microsoft mailbox on a domain that has published a DMARC record with the reject policy, it will only deliver authenticated email to the mailbox, eliminating spoofing of email domains.<\/p>\n If you use Office 365 but aren’t utilizing custom domains, i.e. you use onmicrosoft.com, you don’t need to do anything else to configure or implement DMARC for your organization. But if you have custom domains, or you’re using on-premises Exchange servers, in addition to Office 365, you’ll need to implement DMARC for outbound mail. All of which is straightforward but implementing it across your entire email ecosystem requires some strategy. To ensure your corporate domains are protected, you\u2019ll need to first publish a DMARC record in DNS with a policy of reject. Microsoft uses Agari\u2019s DMARC reporting tool to enhance protection of Microsoft domains from being used in phishing attacks.<\/p>\n Read more about how Microsoft uses Agari to protect its domain and how that is used to validate email in Office 365 in this Microsoft documentation<\/a>.<\/p>\n <\/p>\n The truth is, properly implementing DMARC means you need to identify every single one of your domains and subdomains, across all business units and outside partners\u2014not just the ones you know to send email. That’s because any domain can be spoofed or impersonated, which means every domain should be DMARC-protected to make sure email receiver infrastructures can assess whether incoming messages purporting to come from any of your domains are legit. Brand protection that only covers some domains isn’t really brand protection at all.<\/p>\n The task of identifying and onboarding thousands of domains controlled by multiple business units, outside agencies, and other external partners, both on Office 365 and off, can be daunting. As a result, many organizations may discover that working with a DMARC provider that can fully automate the implementation process across all these parties plus <\/em>supply channel partners is their best chance for success. This is especially true for those that offer fully hosted email authentication<\/a> (DMARC, SPF, and DKIM) to simplify the otherwise tedious and time-consuming process involved with preventing brand impersonations\u2014including ones that leverage domain spoofing.<\/p>\n The good news is that DMARC is supported by 2.5 billion email inboxes worldwide, and more are joining these ranks every day. But unfortunately, even among organizations with DMARC records assigned to their domains, few have them set to p=reject<\/em> enforcement. As it stands now, nearly 90 percent of Fortune 500 businesses<\/a> remain unprotected against email-based spoofing attacks, putting their customers, partners, and other businesses at risk for phishing.<\/p>\n When DMARC is implemented using email ecosystem management solutions<\/a>, organizations have seen phishing emails sent by fraudsters seeking to spoof them drop to near zero. According to Forrester Research, organizations have also seen email conversion rates climb on average 10 percent<\/a>, leading to an average $4 million boost in revenues thanks to increased email engagement.<\/p>\n While it’s no small task, there are three steps that will help you move forward with DMARC and get started:<\/p>\n Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" DMARC security protocol helps you take control of who can send email messages on your behalf, eliminating the ability for cybercriminals to use your domain to send their illegitimate messages.<\/p>\n","protected":false},"author":96,"featured_media":89902,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3671,3688],"products":[3690,3695],"threat-intelligence":[],"tags":[3795],"coauthors":[1916],"class_list":["post-89899","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-email-security","topic-threat-trends","products-microsoft-defender","products-microsoft-defender-for-office-365","tag-phishing"],"yoast_head":"\nGreat, but what exactly is DMARC?<\/h3>\n
Microsoft support for email authentication and DMARC<\/h3>\n
The rise of automated, hosted email authentication<\/h3>\n
3 steps to get started with DMARC<\/h3>\n
\n