Which telecom brands can be spoofed in email?
Telecom carriers have been impersonated for years in 'your account is overdue' SMS-to-email crossover scams. Most US carriers have caught up on DMARC; the international long tail is mixed.
Spoofable
1 (11%)
No DMARC, or DMARC at p=none. Anyone can send from these domains.
Partial protection
0 (0%)
DMARC at p=quarantine, or p=reject with pct<100. Spoofed mail may slip through.
Not practically spoofable
8 (89%)
DMARC p=reject pct=100 + SPF -all or DKIM. Spoofed mail rejected at SMTP.
| Brand | Domain | Verdict | |
|---|---|---|---|
| Orange | orange.com | Spoofable | See the math → |
| AT&T | att.com | Protected | See the math → |
| BT | bt.com | Protected | See the math → |
| Bell Canada | bell.ca | Protected | See the math → |
| Comcast | comcast.com | Protected | See the math → |
| NTT | global.ntt | Protected | See the math → |
| T-Mobile | t-mobile.com | Protected | See the math → |
| Verizon | verizon.com | Protected | See the math → |
| Vodafone | vodafone.com | Protected | See the math → |
Other categories
What does "spoofable" actually mean?
A domain is spoofable when a third party can send mail FROM addresses at that domain (e.g. [email protected]) and have it land in inboxes. The mechanism that prevents this is DMARC enforcement combined with SPF and DKIM. Without all three, receivers have no policy to apply against unauthorised senders.
Want the same check on your own domain? Run the free Spoofability check.
This category last scored: .