{"id":63967,"date":"2022-12-22T12:36:40","date_gmt":"2022-12-22T11:36:40","guid":{"rendered":"https:\/\/blog.mailfence.com\/o-que-e-email-spoofing\/"},"modified":"2024-10-23T12:07:03","modified_gmt":"2024-10-23T10:07:03","slug":"o-que-e-email-spoofing","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/","title":{"rendered":"O que \u00e9 email spoofing e como identificar emails falsos?"},"content":{"rendered":"\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"246\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/Email-Spoofing-blog-1024x246.png\" alt=\"Email spoofing definition\" class=\"wp-image-33290\" title=\"Email spoofing definition\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/Email-Spoofing-blog-1024x246.png 1024w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/Email-Spoofing-blog-300x72.png 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/Email-Spoofing-blog-768x184.png 768w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/Email-Spoofing-blog.png 1250w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Email spoofing is a cyberattack in which a malicious actor impersonates a legitimate sender. They hide their identity by sending an email from a fake email address.<\/strong> <strong>They trick you into believing the email address is genuine<\/strong>.<strong> How does it work, and how to spot and prevent email spoofing? Let&#8217;s have a look.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-email-spoofing\">What is Email Spoofing?<\/h2>\n\n\n\n<p>Email spoofing is a very popular cyberattack tactic that is often used in <a href=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a> campaigns and many other <a href=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-engenharia-social\/\">social engineering<\/a> schemes.<\/p>\n\n\n\n<p>The idea is very simple. You are much more likely to open and respond to an email if you think it came from a legitimate and known sender. Therefore, the point is to send a fraudulent email from a seemingly genuine sending address. <\/p>\n\n\n\n<p>It can be a colleague, family member, boss, service, or brand you are using, etc. Basically, anyone you might trust and whose email you&#8217;re likely to open and reply to without double-checking.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-email-spoofing-work\">How does Email Spoofing Work?<\/h2>\n\n\n\n<p>Email spoofing is notoriously easy to do as it <strong>only requires a common email platform like Gmail or Outlook and an SMTP (Simple Mail Transfer Protocol) server.<\/strong><\/p>\n\n\n\n<p>The reason why it works is that SMTP has no way to authenticate the sender&#8217;s email address, which allows the hacker to forge the <a href=\"https:\/\/blog.mailfence.com\/email-header\/\" target=\"_blank\" rel=\"noreferrer noopener\">email header<\/a>, specifically the FROM, REPLY-TO and RETURN-PATH fields.<\/p>\n\n\n\n<p>There are three ways that an email can be spoofed:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-via-the-display-name\">Via the Display Name<\/h3>\n\n\n\n<p>This type of email spoofing is the most common and easiest to do. In it, the hacker first opens a new email account (usually Gmail) with the same name as the person or brand that they want to impersonate.<\/p>\n\n\n\n<p>For instance, you might get an email from Elon Musk that looks like this:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"801\" height=\"460\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/09\/Screenshot-2022-09-27-at-09.43.34.png\" alt=\"Email spoofing via display name\" class=\"wp-image-31143\" title=\"Email spoofing via display name\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/09\/Screenshot-2022-09-27-at-09.43.34.png 801w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/09\/Screenshot-2022-09-27-at-09.43.34-300x172.png 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/09\/Screenshot-2022-09-27-at-09.43.34-768x441.png 768w\" sizes=\"auto, (max-width: 801px) 100vw, 801px\" \/><\/figure>\n\n\n\n<p>Obviously, if you think that Elon Musk has no better recruitment process than randomly emailing strangers, then you&#8217;re extremely naive. But this tactic still works for a number of reasons.<\/p>\n\n\n\n<p>Namely:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>It comes from a legitimate email address<\/strong>. This is just a Gmail account I created in less than a minute and used to send an email as &#8220;Elon Musk&#8221; to another of my accounts to show how easy it is. As a result, the email didn&#8217;t go to the spam folder, but straight to the inbox.<\/li>\n\n\n\n<li><strong>It exploits the email user interface. <\/strong>Since the user interface will only show the display name and not the actual sender&#8217;s email address or metadata, along with the subject line and part of the message, anyone can impersonate someone like Elon Musk this way.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-via-lookalike-domains\">Via Lookalike Domains<\/h3>\n\n\n\n<p>Of course, anyone can create a Gmail account, but most businesses use a custom email domain.<\/p>\n\n\n\n<p>For example, let&#8217;s say a business uses the domain @business.co.<\/p>\n\n\n\n<p>All an attacker has to do is create a similar domain, like @bvsness.co and by changing just one character, make their email look like it comes from a legitimate brand to an untrained or inattentive eye.<\/p>\n\n\n\n<p>Very often, this type of spoofing is used to trick users into revealing their passwords or to transfer money to the attacker by impersonating a legitimate company.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-via-legitimate-domains\">Via Legitimate Domains<\/h3>\n\n\n\n<p>Still, you can easily spot email spoofing via lookalike domains if you just pay a little attention to the domain itself.<\/p>\n\n\n\n<p>However, hackers can also use legitimate domain names to make their emails even more believable.<\/p>\n\n\n\n<p>Again, this is because SMTP has no way to authenticate the sender. The hacker can manually specify the FROM field to look like it comes from someone working in a specific company, whereas they don&#8217;t.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-would-someone-spoof-emails\">Why Would Someone Spoof Emails?<\/h2>\n\n\n\n<p>The obvious answer to &#8220;why would someone spoof emails?&#8221; is because they want to hide their true identity and impersonate someone else, all in order to facilitate illegal or malicious gain.<\/p>\n\n\n\n<p>They have various reasons for doing so:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hiding the sender&#8217;s real identity<\/strong><\/li>\n\n\n\n<li><strong>Impersonating that they are someone the recipient knows<\/strong><\/li>\n\n\n\n<li><strong>Pretending that they are a company whose services or products the recipient is using<\/strong><\/li>\n\n\n\n<li><strong>Damaging someone else&#8217;s reputation<\/strong><\/li>\n\n\n\n<li><strong>Avoiding spam filters<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Commonly, email spoofing is used in various types of phishing or spam attacks, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/blog.mailfence.com\/distinguish-spear-phishing-from-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spear phishing<\/a><\/strong> &#8211; a type of phishing attack in which the criminal impersonates someone known to the recipient<\/li>\n\n\n\n<li><strong>BEC (Business Email Compromise)<\/strong> &#8211; a phishing attack that uses a hacked, spoofed, or otherwise impersonated business email address<\/li>\n\n\n\n<li><strong>VEC (Vendor Email Compromise)<\/strong> &#8211; a type of BEC attack in which the attacker pretends to be from a business in the company&#8217;s supply chain, like a vendor, for instance<\/li>\n\n\n\n<li><strong>CEO Fraud<\/strong> &#8211; another type of BEC attack, in which the attacker impersonates a high-ranking executive in the company (usually C-level)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-prevent-email-spoofing\">How to Prevent Email Spoofing?<\/h2>\n\n\n\n<p>The good news is that, as easy as email spoofing is to do, it&#8217;s also easy to spot and prevent.<\/p>\n\n\n\n<p>Here&#8217;s how:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Watch out for Red Flags<\/h3>\n\n\n\n<p>A spoofed email will have a similar, but still incorrect sender email address, links that point everywhere but the official website, unwanted attachments, grammar errors, unfamiliar file types, use threats to pressure you to respond quickly (give your account info or send money), or be too good to be true (like getting a job from Elon Musk). Basically, errors you can spot in most <a href=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-engenharia-social\/\">social engineering<\/a> attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Don&#8217;t Click on Weird Links or Unwanted Attachments<\/h3>\n\n\n\n<p>Stay away from any weird links or email attachments you didn&#8217;t ask for, as these might redirect you to a <a href=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-phishing\/\">phishing<\/a> website or <a href=\"https:\/\/blog.mailfence.com\/social-engineering-what-is-scareware\/\">download malware<\/a> to your computer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Just don&#8217;t Respond<\/h3>\n\n\n\n<p>Phishing and spoofing emails only work if you respond to them and divulge your personal information. By simply not responding to them, they have zero effect.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Inspect the Email Header<\/h3>\n\n\n\n<p>To inspect the <a href=\"https:\/\/blog.mailfence.com\/email-header\/\">email header<\/a>, simply open the email message, right-click and select &#8220;View Source&#8221;. <\/p>\n\n\n\n<p>Specifically, look at the RECEIVED section and if the domain differs from that in the FROM address, that email is most likely forged.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Use Email Security Protocols<\/h3>\n\n\n\n<p>While SMTP can&#8217;t authenticate the sender&#8217;s address, three other frameworks can: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Sender_Policy_Framework\">SPF<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/DomainKeys_Identified_Mail\">DKIM<\/a>, and <a href=\"https:\/\/dmarc.org\/\">DMARC<\/a>. These three are a must in your <a href=\"https:\/\/blog.mailfence.com\/spoofing-defense-spf-dkim-dmarc\/\" target=\"_blank\" rel=\"noreferrer noopener\">email spoofing defence<\/a>.<\/p>\n\n\n\n<p>So what does each of them do?<\/p>\n\n\n\n<p><strong>SPF (Sender Policy Framework) <\/strong>&#8211; checks if the IP (Internet Protocol) address is authorized to send emails to the recipient&#8217;s domain.<\/p>\n\n\n\n<p><strong>DKIM (Domain Keys Identified Mail) &#8211; <\/strong>authenticates that the email is sent by an authorized server and not changed in transit.<\/p>\n\n\n\n<p><strong>DMARC (Domain-based Message Authentication, Reporting, and Conformance) &#8211; <\/strong>DMARC tells the recipient&#8217;s server what should happen with failed checks and sends feedback and reports about it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-digitally-sign-your-emails\">6. Digitally Sign Your Emails<\/h3>\n\n\n\n<p>Finally, the ultimate protection against email spoofing is to <a href=\"https:\/\/blog.mailfence.com\/pt\/emails-assinados-digitalmente\/\" target=\"_blank\" rel=\"noreferrer noopener\">digitally sign your emails<\/a>.<\/p>\n\n\n\n<p>This provides the following security aspects:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Authenticating and verifying the sender <\/strong>(proves the sender is who they claim to be)<\/li>\n\n\n\n<li><strong>Integrity check <\/strong>(proves that the message was not changed in transit)<\/li>\n\n\n\n<li><strong>Non-repudiation <\/strong>(the sender can&#8217;t deny they sent the message)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n\n\n\n<p>A good email defence, is to stay alert and avoid common <a href=\"https:\/\/blog.mailfence.com\/7-email-security-mistakes-and-how-to-avoid-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">email mistakes<\/a>. Also, our <a href=\"https:\/\/blog.mailfence.com\/email-security-and-privacy-course\/\" target=\"_blank\" rel=\"noreferrer noopener\">Email security and privacy course<\/a> can significantly improve your email awareness, so be sure to go through it as well. Feel free to spread the word! If you want to go even further, securing your email account is the most effective way to secure all your accounts. Why not try our collaborative <a href=\"https:\/\/blog.mailfence.com\/best-gsuite-alternative\/\">suite<\/a> today? We support <a href=\"https:\/\/mailfence.com\/pt\/criptografia-de-ponta-a-ponta.jsp\">end-to-end encryption<\/a> and <a href=\"https:\/\/blog.mailfence.com\/pt\/emails-assinados-digitalmente\/\">digital signatures<\/a>. Wait no more!<\/p>\n\n\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-share-this-article\">Share This Article<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>O email spoofing \u00e9 um tipo de ciberataque em que atores maliciosos se passam por remetentes leg\u00edtimos. Para ocultar sua identidade, os cibercriminosos utilizam emails falsos convincentes o suficiente para enganar a v\u00edtima. Mas como isso funciona, e como identificar este tipo de amea\u00e7a? Confira a seguir.<\/p>\n","protected":false},"author":4,"featured_media":85310,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1379],"tags":[],"class_list":["post-63967","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca-de-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Email spoofing e como evitar emails falsos? | Mailfence Blog<\/title>\n<meta name=\"description\" content=\"Email spoofing is a cyberattack in which the attacker forges the email header to impersonate a known sender. Let&#039;s see how you can spot it!\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"O que \u00e9 email spoofing e como identificar emails falsos? | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"O que \u00e9 email spoofing e como identificar emails falsos? | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-22T11:36:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-23T10:07:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/10-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Patrick De Schutter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pdeschutter\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick De Schutter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/\"},\"author\":{\"name\":\"Patrick De Schutter\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/20a0c25f4ff87b6c5510971559c01c28\"},\"headline\":\"O que \u00e9 email spoofing e como identificar emails falsos?\",\"datePublished\":\"2022-12-22T11:36:40+00:00\",\"dateModified\":\"2024-10-23T10:07:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/\"},\"wordCount\":1244,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/10-1.png\",\"articleSection\":[\"Seguran\u00e7a de e-mail\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/\",\"name\":\"Email spoofing e como evitar emails falsos? | Mailfence Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/10-1.png\",\"datePublished\":\"2022-12-22T11:36:40+00:00\",\"dateModified\":\"2024-10-23T10:07:03+00:00\",\"description\":\"Email spoofing is a cyberattack in which the attacker forges the email header to impersonate a known sender. Let's see how you can spot it!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/10-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/10-1.png\",\"width\":600,\"height\":600,\"caption\":\"\\\"'\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/o-que-e-email-spoofing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a de e-mail\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/category\\\/seguranca-de-email\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"O que \u00e9 email spoofing e como identificar emails falsos?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/#\\\/schema\\\/person\\\/20a0c25f4ff87b6c5510971559c01c28\",\"name\":\"Patrick De Schutter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"caption\":\"Patrick De Schutter\"},\"description\":\"Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or Express.be. He is a strong believer and advocate of encryption and privacy.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/pdeschutter\\\/\",\"https:\\\/\\\/x.com\\\/pdeschutter\"],\"gender\":\"male\",\"knowsLanguage\":[\"English\",\"French\",\"Dutch\",\"Swedish\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/pt\\\/author\\\/patrick\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Email spoofing e como evitar emails falsos? | Mailfence Blog","description":"Email spoofing is a cyberattack in which the attacker forges the email header to impersonate a known sender. Let's see how you can spot it!","robots":{"index":"noindex","follow":"follow"},"og_locale":"pt_BR","og_type":"article","og_title":"O que \u00e9 email spoofing e como identificar emails falsos? | Mailfence Blog","og_description":"O que \u00e9 email spoofing e como identificar emails falsos? | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2022-12-22T11:36:40+00:00","article_modified_time":"2024-10-23T10:07:03+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/10-1.png","type":"image\/png"}],"author":"Patrick De Schutter","twitter_card":"summary_large_image","twitter_creator":"@pdeschutter","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"Patrick De Schutter","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/"},"author":{"name":"Patrick De Schutter","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/20a0c25f4ff87b6c5510971559c01c28"},"headline":"O que \u00e9 email spoofing e como identificar emails falsos?","datePublished":"2022-12-22T11:36:40+00:00","dateModified":"2024-10-23T10:07:03+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/"},"wordCount":1244,"publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/10-1.png","articleSection":["Seguran\u00e7a de e-mail"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/","url":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/","name":"Email spoofing e como evitar emails falsos? | Mailfence Blog","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/10-1.png","datePublished":"2022-12-22T11:36:40+00:00","dateModified":"2024-10-23T10:07:03+00:00","description":"Email spoofing is a cyberattack in which the attacker forges the email header to impersonate a known sender. Let's see how you can spot it!","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/10-1.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/12\/10-1.png","width":600,"height":600,"caption":"\"'"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a de e-mail","item":"https:\/\/blog.mailfence.com\/pt\/category\/seguranca-de-email\/"},{"@type":"ListItem","position":3,"name":"O que \u00e9 email spoofing e como identificar emails falsos?"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/pt\/#website","url":"https:\/\/blog.mailfence.com\/pt\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/pt\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/20a0c25f4ff87b6c5510971559c01c28","name":"Patrick De Schutter","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","caption":"Patrick De Schutter"},"description":"Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or Express.be. He is a strong believer and advocate of encryption and privacy.","sameAs":["https:\/\/www.linkedin.com\/in\/pdeschutter\/","https:\/\/x.com\/pdeschutter"],"gender":"male","knowsLanguage":["English","French","Dutch","Swedish"],"url":"https:\/\/blog.mailfence.com\/pt\/author\/patrick\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/63967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/comments?post=63967"}],"version-history":[{"count":3,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/63967\/revisions"}],"predecessor-version":[{"id":91688,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/63967\/revisions\/91688"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media\/85310"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media?parent=63967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/categories?post=63967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/tags?post=63967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}