Someone could be phishing your customers right now using your own domain name — and your legitimate email infrastructure is helping them. Here's how to find out and shut it down.
Here's how phishing works in 2026: an attacker sets up a convincing login page that looks exactly like your app. They buy a domain that looks almost like yours — yourcompany-support.com or yourco-auth.net. They email your customers from an address that appears to be yours. Your customers see your domain in the sender field and trust it completely.
Now imagine the same attack, but the attacker is using your exact domain — not a lookalike. The email comes from [email protected] and the phishing page is at yourcompany.com-support.top. This is brand impersonation via your own infrastructure, and it happens when email authentication is missing or misconfigured.
Most businesses don't realize that without proper email authentication (SPF, DKIM, DMARC), anyone can send email that appears to come from your domain. The receiving mail server has no way to verify that the email actually came from you.
What attackers do: they look up your domain, see you're missing DMARC (or have a weak policy), and start sending emails from servers you don't own but that claim to be you. These emails land in inboxes with your domain as the sender — because the receiving servers can't tell the difference.
Go to your DNS provider and check for these records:
TXT record for _dmarc.yourdomain.com — should exist and have a policy of reject or quarantine, not noneTXT record for _spf.yourdomain.com or your main domain — should list only the servers you actually send email fromDKIM record (usually a CNAME or TXT record for a selector like selector._domainkey.yourdomain.com)If DMARC shows v=DMARC1; p=none, your domain is being spoofed right now and you have no protection.
Search Google for: site:yourdomain.com phishing (this won't find everything but can surface known phishing sites using your brand). Also search for your domain in phishing databases like PhishTank and OpenPhish — free to search, updated daily.
Attackers often use SSL certificates on phishing sites to appear more legitimate. Search crt.sh for your domain name and any similar variants — look for certificates issued to domains that look like yours (yourco-login.com, yourco-auth.net, etc.). You'll find phishing infrastructure before it's used against your customers if you check regularly.
Domain registrars won't give you a full list, but you can check newly registered domains that contain your brand name using services like DomainTools or similar OSINT tools. If a domain that looks like yours was registered in the last 30 days and is resolving to a server in a suspicious country, that's a threat to investigate.
safeweb.norton.com or Google's Safe Browsing reporting page — they'll add it to blocklists that protect other users[email protected] or the anti-phishing team at the major email providers (Microsoft, Google, Yahoo)The only real solution is properly configured email authentication:
include:_spf.google.com plus vague includes. Audit it regularly._dmarc.yourdomain.com — if it doesn't exist or says p=none, that's your highest-priority fixBrand impersonation phishing doesn't require the attacker to compromise your systems — they just need your domain to not be protected. That gap is fixable, and the fix is free. The cost of not fixing it is your customers' trust.
Brand impersonation phishing uses your own domain to betray your customers' trust.
Check If Your Domain Is Being Spoofed →