Over 90% of Top Email Domains Still Vulnerable to Phishing Attacks Due to Weak DMARC Policies

Listen to this Post

Featured Image
Email Security Crisis: Most Domains Still Not Blocking Spoofed Emails

Despite years of rising cyber threats and clear technical standards, the vast majority of email domains globally are still failing to block spoofed messages, according to new data from EasyDMARC. This exposes users and organizations to increasingly convincing phishing attacks—many of which can lead to severe financial and reputational damage.

Global Email Security Still Lacking

EasyDMARC’s 2025 DMARC Adoption Report revealed that only 7.7% of the world’s top 1.8 million email domains have enforced the strictest DMARC policy—’p=reject’—which actively prevents malicious emails from being delivered. This low adoption rate leaves more than 90% of high-traffic email domains open to impersonation and fraud.

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an email authentication standard that builds upon SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). Its purpose is to verify that the sender’s domain has not been spoofed. While adoption of DMARC has increased since 2023, much of it stops at ‘p=none’, a passive setting that only monitors suspicious emails without taking action against them.

The report showed a strong correlation between strict DMARC enforcement and a decrease in phishing email success rates. In countries like the US, UK, and Czech Republic—where DMARC policies are mandatory—phishing success dropped significantly. The US saw phishing emails drop from 68.8% in 2023 to just 14.2% in 2025. Conversely, countries with no mandatory policy, such as Qatar and the Netherlands, saw little to no progress.

Despite rising adoption, significant gaps remain. More than half of domains analyzed (52.2%) had no DMARC record at all. And of those that did, over 40% lacked the reporting mechanisms (like RUA tags) that allow organizations to monitor authentication failures and investigate malicious use of their domains.

Recent real-world attacks show the consequences of these lapses. North Korea-linked hackers exploited weak DMARC settings in 2024 to impersonate experts and journalists in phishing campaigns. In another case, researchers at Guardio Labs uncovered spoofed emails appearing to come from brands like Disney, Nike, and Coca-Cola—enabled by a flaw in Proofpoint’s system.

EasyDMARC CEO Gerasim Hovhannisyan likened current DMARC misconfigurations to installing a security system but never turning it on. “Phishing remains one of the oldest and most effective cyber-attacks. Without full DMARC enforcement, you’re leaving the door wide open,” he warned.

The findings were unveiled as EasyDMARC prepares to showcase at the Infosecurity Europe 2025 conference, celebrating its 30th anniversary at ExCel London from June 3–5.

What Undercode Say:

The EasyDMARC report shines a spotlight on one of cybersecurity’s most persistent failures—email authentication. DMARC has been around for years, yet implementation remains dangerously incomplete. The root problem isn’t just technical complexity. It’s a mix of apathy, lack of awareness, and poor regulatory enforcement.

The fact that only 7.7% of top domains use the ‘p=reject’ policy is startling. This isn’t a minor oversight. It’s a widespread security negligence that allows cybercriminals to pose as trusted institutions with ease. When a spoofed email appears to come from a bank, government agency, or major brand, users are far more likely to engage, increasing the odds of successful phishing.

Adopting DMARC with a passive policy like ‘p=none’ creates a false sense of security. It collects data but offers no real protection. That’s why the security impact in countries with mandates like the US is so dramatic—moving from passive to active enforcement makes the difference between warning signs and real barriers.

The lack of reporting tags in over 40% of DMARC-enabled domains further limits visibility. Without knowing who’s trying to spoof your domain, there’s no accountability or follow-up. DMARC reporting is just as critical as enforcement—it’s the eyes and ears of your email security.

The cited attacks show just how bad it can get. North Korea’s Kimsuky group didn’t invent a new malware strain. They just used basic spoofing tactics made possible by weak DMARC policies. Likewise, the spoofing of major brands through Proofpoint flaws underlines how even advanced protection tools can be bypassed when email policies aren’t airtight.

It’s no longer acceptable for organizations to stop at “monitoring” when it comes to phishing prevention. With data breaches costing millions and reputational damage taking years to recover from, businesses must see full DMARC enforcement as a non-negotiable baseline—not a future goal.

With regulatory bodies tightening standards (like PCI DSS 4.0.1) and email giants like Google and Microsoft mandating stricter policies, the pressure to act is mounting. Still, pressure must turn into priority. Until then, spoofed emails will continue slipping through the cracks, and users will keep paying the price.

Fact Checker Results ✅

DMARC ‘p=reject’ is confirmed as the only policy that fully blocks spoofed emails đŸš«
Countries with mandatory DMARC enforcement do see dramatic drops in phishing email delivery 📉
Over 50% of analyzed domains still don’t have any DMARC policy set at all 🛑

Prediction 🔼

As compliance pressures increase and phishing attacks grow more damaging, global adoption of strict DMARC policies will accelerate in the next 12 to 18 months. Expect governments and regulators to make DMARC enforcement mandatory, especially for critical sectors like finance, healthcare, and public services. Organizations that fail to comply will face not only cyber risks but also legal and financial penalties.

References:

Reported By: www.infosecurity-magazine.com
Extra Source Hub:
https://www.medium.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram