{"id":2267,"date":"2025-08-20T17:41:55","date_gmt":"2025-08-20T17:41:55","guid":{"rendered":"https:\/\/blogs.luc.edu\/uiso\/?p=2267"},"modified":"2025-08-20T17:41:55","modified_gmt":"2025-08-20T17:41:55","slug":"emails-from-myself-lets-talk-about-spoofed-addresses","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/emails-from-myself-lets-talk-about-spoofed-addresses\/","title":{"rendered":"Emails from Myself? Let\u2019s Talk About Spoofed Addresses"},"content":{"rendered":"<p><b><span data-contrast=\"none\">Introduction<\/span><\/b><br \/>\n<span data-contrast=\"none\">Security threats are always evolving and finding new ways to manipulate our trust. One confusing and increasingly common issue we have been noticing at Loyola is receiving suspicious emails that appear to come from your own address. If you\u2019ve ever wondered, \u201cDid I really send that email?\u201d or \u201cIs someone else using my account?\u201d You are not alone. This tactic is called email spoofing, and while it can be alarming, it doesn\u2019t always mean your account has been hacked. Here\u2019s what spoofing is, how it works, and what you can do to protect yourself.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">What is Spoofing?<\/span><\/b><br \/>\n<span data-contrast=\"none\">Email spoofing occurs when someone sends an email that appears to come from a trusted sender but is actually forged. The sender\u2019s address in the email header is manipulated to look like it came from you or someone you know. The goal is to trick recipients into a false sense of security, hoping they will open the message, click on harmful links, and share sensitive information.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">How is it Done?<\/span><\/b><br \/>\n<span data-contrast=\"none\">Spoofing takes advantage of weaknesses in the way email systems verify the sender. Attackers exploit Simple Mail Transfer Protocol (SMTP), which is the basic system that moves emails around. When an email is sent, the \u201cFrom\u201d address can be altered without the receiving server checking if it is legitimate. Attackers use this to make the email appear as though it came from any address they choose.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Misspellings versus Forged Addresses<\/span><\/b><br \/>\n<span data-contrast=\"none\">Sometimes scammers create email addresses that look very similar to real ones by making small changes. For example, they might replace the letter \u201ci\u201d with the number \u201c1.\u201d This is different from spoofing where the attacker directly forges your exact email address. Both techniques aim to deceive you but work in slightly different ways. Spoofing tends to have a higher phish rate, as it is more accurate and realistic looking than misspelled addresses.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Is Someone in My Account?<\/span><\/b><br \/>\n<span data-contrast=\"none\">Not necessarily. Spoofing can happen without anyone accessing your account. However, it is smart to check your email account activity and sent messages for anything unusual. If you find suspicious activity and believe your account is compromised, change your password immediately, inform UISO, and enable multi-factor authentication to protect your account.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">What to Do With Spoofed Messages?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Spoofed emails can look convincing, but it is crucial to avoid engaging with them entirely. Here\u2019s how to handle them:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559685&quot;:0,&quot;335559738&quot;:220,&quot;335559739&quot;:220}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Do not reply. Responding can confirm to attackers that your email address is active, which may increase the number of spam or spoofed emails you receive.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Do not click any links or download attachments. Even if the email looks like it came from you or a friend, treat it as unsafe until verified.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Check your account activity. Look in your Sent folder and recent sign-in history to confirm there are no unauthorized messages or logins. If you find suspicious activity, change your password immediately.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Report the spoof. Forward the email to <\/span><a href=\"mailto:ITSServiceDesk@luc.edu\"><span data-contrast=\"none\">ITSServiceDesk@luc.edu<\/span><\/a><span data-contrast=\"none\">. This helps our security team stay informed on potential university attacks.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"none\">Delete the message. Once reported, remove it from your inbox to prevent accidental clicks in the future.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"none\">Stay alert for follow-up attempts. Spoofers may send multiple messages over time. Being aware of the pattern makes them easier to spot. Attackers often stop when there is no interaction.\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"none\">Conclusion<\/span><\/b><br \/>\n<span data-contrast=\"none\">Email spoofing is a common way attackers try to trick people into trusting fake messages. While it can be alarming to see emails that appear to come from your own address, it does not always mean your account is compromised. By staying alert and following security best practices, you can help protect yourself and the campus community. If you ever have questions or concerns, contact Loyola\u2019s UISO for assistance.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Security threats are always evolving and finding new ways to manipulate our trust. One confusing and increasingly common issue we have been noticing at Loyola is receiving suspicious emails that appear to come from your own address. If you\u2019ve ever wondered, \u201cDid I really send that email?\u201d or \u201cIs someone else using my account?\u201d [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2267","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/2267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=2267"}],"version-history":[{"count":1,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/2267\/revisions"}],"predecessor-version":[{"id":2268,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/2267\/revisions\/2268"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=2267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=2267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=2267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}