What is Spoofing Email?
Did you receive an email with a sender name already known to you? Or maybe this sender is the same as your email? And you simply opened this email thinking it was from you or one of your friends. But it is actually a fraudulent email!
When you send a regular letter by post, you must definitely write the name of the addressee on the outer envelope, as well as the name and address of the sender who is you, if the letter does not arrive, the postman will return it to you at the address you have provided.
But if you are not interested in losing the message and returning it to you, then you can write any address in place of the sender's address, even if this address is the same address as the addressee. This is exactly what a scam email does, as it obtains a huge number of emails through the dark web, to use programs that send random messages in which the name of the sender matches the addressee. Or an account addresses like payment@amazon.com are used and you think you've received a message from Amazon or your personal bank, and these messages often contain a link where you've been hacked.
What can I do in this case?
Sophisticated mail systems such as GMail can recognize a large percentage of this type of email, but the recognition algorithm can certainly be bypassed. Therefore, the best thing you can do is not to click on anything in the e-mail, even on the blank white space (it may contain a link) until you are absolutely sure that this e-mail is sent to you personally and from a party that you know perfectly and that you are expecting an e-mail from.
And certainly not to download any files no matter who the sender is a trusted person, it is possible that your friend's mail has been hacked and a hacked file was sent from his mail to you.
This message attached to the picture I receive continuously
"You are probably wondering why you are receiving an email from YOUR own address, right? I'll explain everything to you.
I'm a hacker and hacked your devices a few months ago, set up a virus on an adult site YOU visited, and managed to get hold of your device.
Only, I noticed that you had very ... particular tastes when it came to "pornography".
So I abused your device to turn it into an RDP (remote control) server and guess what I did?
I simply recorded a video in split screen with your browser on one side on the "site" and on the other your webcam recording you having ... fun. This is how I was able to send you this email from YOUR compromised address.
Following that, I made a copy of your contacts, photos, passwords, bank details and much more.
I promise you that I will not bother you again after your payment, because you are not my only victim. This is the code of honor for hackers. Don't be mad at me, everyone has their own job after all ...
Want to know what you can do?
Well, I think 1500 euros is a fair price for our little secret. You will pay by Bit coin (If you haven't heard of it, search "how to buy bit coins" on Google).
My Bit coin wallet address: 3DPYFHeDWApfbDq XEdEaA4PdrrnhjKkqMz ( delete space )
(Respect upper and lower case, copy / paste is preferable)
Important You have 48 hours to make the payment. (I have a tracker in this email and I know you opened it.)
The video as well as the copy of all this data is already on my side and if you do not cooperate, I will be obliged to send the video to your most important contacts, your family, your colleagues, on facebook , twitter and many others ...
Changing your passwords, destroying the virus, sending for repair or disinfecting your computer are of no use since your data is already on a remote server. Don't take me for a jerk.
If you want proof, answer with "Yes!" and I will start sending the recording to 6 of your most important contacts. This is a non-negotiable offer, that said, don't waste my time and yours, think about the consequences of your actions.
Stopping email spoofing is one of your goals.??
Using a secure email service and following good cybersecurity hygiene will help you avoid email spoofing. When registering on websites, use temporary accounts. You'll be able to protect your private email address from being exploited to send faked email messages in mass.