Key takeaways
- GenAI enables highly convincing, context-rich phishing and BEC emails at unprecedented speed and volume.
- AI-generated typosquatted domains bypass authentication, requiring proactive monitoring and takedown.
- Strong DMARC enforcement blocks exact-domain spoofing and protects brand trust at the source.
Artificial intelligence has dramatically changed the economics of cybercrime. What once required time, research, and human effort can now be automated, scaled, and optimized by generative AI (GenAI). Nowhere is this shift more evident and more dangerous than in email‑based impersonation attacks. With AI‑powered tools, attackers can generate highly convincing emails in seconds, mimicking tone, writing style, and contextual awareness with unsettling accuracy.
At the same time, emerging “vibe coding” tools are lowering the barrier to building malicious infrastructure. Attackers can rapidly generate realistic phishing websites designed to harvest credentials or distribute malware, without traditional development expertise.
The result is a surge in phishing campaigns that appear legitimate, relevant, and urgent across both email and web channels. In this environment, traditional email security controls alone are no longer sufficient.
To meaningfully reduce risk, you need a security strategy that starts with preventing AI-accelerated impersonation at the source. That begins with strong Domain‑based Message Authentication, Reporting & Conformance (DMARC) enforcement as well as monitoring and takedown of lookalike domains.
AI-accelerated corporate impersonation at scale
GenAI has lowered the barrier for attackers. Today, they can impersonate executives, employees, partners, and brands with minimal effort. Attackers can now:
- Generate polished, professional emails in the writing voice of executives and brands
- Automatically tailor messages using publicly available information from company websites, LinkedIn profiles, and press releases
- Create realistic spoofed websites that mirror corporate brands, enabling scalable end-to-end phishing campaigns
- Rapidly scale phishing and business email compromise (BEC) campaigns across thousands of targets
These AI‑generated messages often appear contextually accurate, aligned with current events, and are business‑relevant. As a result, they’re far more likely to bypass human skepticism. Even security‑aware employees can be deceived when an email appears to come from a trusted domain and aligns with ongoing business activity.
The result is a surge in impersonation‑based attacks. These attacks rely less on technical exploitation and more on abusing trust in brand names, domains, and the identities of familiar senders.
The rise of lookalike domains
While DMARC is highly effective at stopping exact‑domain spoofing, attackers also rely on lookalike domains. These domains appear visually or semantically similar to legitimate brands—but they are not exact matches.
To create convincing lookalike domains that evade casual inspection, attackers combine techniques such as transposed characters, character substitutions, homoglyphs from other alphabets, hyphenated brand variants, and alternative top-level domains.
Modern AI tools can:
- Generate large lists of plausible, brand‑adjacent domain variations in seconds
- Select the ones that are most likely to deceive
- Craft phishing content that precisely matches the fake domain’s theme
- Automate testing to pick the variants that get the highest victim engagement
This combination of domain‑generation algorithms plus GenAI content creation enables attackers to build phishing attacks without ever touching your real domain.
Because lookalike domains are attacker‑owned, they bypass authentication controls like SPF, DKIM, and DMARC entirely. This makes detection and takedown far more challenging without dedicated visibility into domain registration trends, threat intelligence, and active monitoring.
The role of DMARC in modern email security
DMARC is an email authentication protocol that builds on SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail). Together, these controls allow domain owners to:
- Verify that an email claiming to come from its domain is authorized and cryptographically intact
- Specify how receiving mail servers should handle messages that don’t pass authentication checks
- Gain visibility into all sources that send email on their behalf
- Collect samples of messages that fail authentication to help differentiate legitimate sources from spoofed traffic
When enforced with a strong policy (such as “quarantine” or “reject”), DMARC prevents unauthorized senders from successfully spoofing a domain. This removes a critical tool from the attacker’s arsenal and directly disrupts impersonation‑based attacks before they ever reach an inbox.
Why DMARC matters more than ever in the age of AI
AI supercharges spoofing attacks. Attackers still need trusted domains to make their messages believable. And DMARC directly targets that dependency.
Several factors make DMARC enforcement especially critical today:
- AI‑driven scale. Attackers can generate and send spoofed emails faster than ever.
- Brand trust erosion. A single successful impersonation can damage customer and partner confidence.
- Rising expectations. Regulators, partners, and vendors increasingly expect DMARC enforcement as a baseline control.
Without a strong DMARC policy, organizations leave their domains open to abuse, allowing attackers to weaponize their brand identity at scale.
However, DMARC alone cannot stop lookalike domains. That’s why organizations must treat DMARC as foundational, not comprehensive.
DMARC is the foundation, not the finish line
DMARC is not a standalone solution to all email threats. It stops exact‑domain impersonation before content filtering, user training, or AI‑based detection even come into play.
But lookalike domain threats require additional visibility, intelligence, and enforcement capabilities that go beyond DNS‑based email authentication.
Not sure where to start? Proofpoint can help
It can be challenging to implement DMARC correctly. This is especially true for organizations with complex email streams, third‑party senders, and legacy systems.
Proofpoint’s Email Fraud Defense solution helps you stay ahead of AI‑enabled impersonation attacks by simplifying DMARC deployment and providing unmatched visibility into email traffic. Here’s how it can help:
- Supports the process of authenticating inbound and outbound email
- Identifies legitimate senders, including third‑party services
- Enables safe, phased DMARC enforcement without disrupting valid business messages
- Highlights potential authentication risks with supplier domains
- Provides industry‑leading hosted SPF, DKIM, DMARC, and BIMI (Brand Indicators for Message Identification) services
- Goes beyond exact‑match domain threats by detecting lookalike domain registrations and usage—exposing attacker‑owned typosquatted domains that are used to spoof trusted brands
- Integrates with the Proofpoint Takedown service to remove malicious lookalike sites at the registrar or hosting provider level
Supported by Proofpoint’s experienced DMARC consultants, you get hands-on guidance across every phase of deployment—from discovery and sender prioritization to enforcement and continuous optimization.
To learn more about how to strengthen your protection against impersonation and domain abuse, contact your Proofpoint representative today.