How to prevent spam messages that spoof sender
Problem reported by BMark - 1/12/2026 at 2:12 AM
Submitted
Hello everyone,

I'd like some advice on how to prevent these spam messages that spoof the sender's name by inserting the same address as the recipient's. 
They always come from the "xxxx.bc.googleusercontent.com" servers with a header like this:
---------------------------
From: Agency Help <info@real-domain-name.com>
To: info@real-domain-name.com

Return-Path: <>
Received: from [10.88.0.4] (46.206.190.35.bc.googleusercontent.com [35.190.206.46]) by ******* with SMTP;
   Sat, 10 Jan 2026 13:12:13 +0100
Content-Type: multipart/related; boundary="===============0782764610031259282=="
MIME-Version: 1.0
From: Agency Help <info@real-domain-name.com>
To: info@real-domain-name.com
Subject: =?utf-8?b?UmU6?=
Reply-To: your-email@yourdomain.com
X-Priority: 2
---------------------------

The messages are intercepted by anti-spam rules and quarantined, but I wish they were blocked before they reached the server, Is there a way to do this?

Thanks
Mark

Douglas Foster Replied
You should reject or silently discard anything from googleusercontent.com.  It is always spam.
BMark Replied
Hello Douglas, 
We have actually seen that some developers and applications use the xx.googleusercontent.com domain even to send emails, so blocking it completely is not a good idea.
Douglas Foster Replied
My Question:
"Does Google ensure that emails sent from googleusercontent.com reflect the identity of an authenticated user?"
My Answer:
Clearly not, or you would not be asking abut how to prevent spoofing.    Therefore, no message from them can be trusted because any client can impersonate any identity.

When someone chooses to operate from an insecure platform, it does not obligate you to accept those messages.

You can, of course, choose to accept messages from some sender identities in the hope that those particular identities will never be impersonated.   In that case, you need a spam filter system that will allow you to quarantine those messages by default, but allow messages from specific identities.

Using the standard authentication mechanisms may or may not help.   Are your trusted senders able to apply DKIM signatures to their messages?   I suspect not.   Have they configured the GoogleUserContent servers into their SPF policy?   If so, do you have tools in place to enforce SPF for most messages and create local policy exceptions for acceptable senders that have missing, incorrect, or malformed SPF policies?   Enforcing SPF is not easy because not everyone participates correctly.

The only way to prevent all impersonation is to have rules in place that ensure authentication of every accepted message, which means using local policy when SPF/DKIM/DMARC cannot provide a correct answer or cannot provide any answer.   It seems to me that complete impersonation prevention should be a standard part of every filtering solution, but it does not.   I had to build my own implementation with customized Declude.   Until vendors take this seriously, I recommend custom development to solve this important problem.


BMark Replied
Yes, you're right, and I agree with you.
Personally, I don't understand why mail server managers and ISPs don't use SPF/DKIM/DMARC policies and authentication correctly. Spoofing would essentially be solved, and a good portion of spam would be eliminated.
If it were up to me, any message without the correct policies would be rejected. Perhaps then everyone would implement them.

I've been wondering for years why the available tools aren't used correctly, and I can't find an answer...
Douglas Foster Replied
"Correct" use of SPF/DKIM/DMARC is not a simple matter.

These tools are voluntary:   they are useful if the domain owner has published policies and if those policies are published correctly.   When dealing with crowd-sourced data, you have to assume that there will be errors, so your security design has to have a plan to detect those problems and correct them with local policy entries.

For instance:  
example.com does not produce SPF Pass because its policy is non-existent, malformed, or incomplete.   You determine that their messages are acceptable and that they legitimately come from Outlook.com.    You need a local policy rule like this: 
"Treat messages as equivalent to SPF Pass when the host name is *.Outlook.com, the host name is verified by fcDNS, and the SMTP MailFrom domain is example.com or *.example.com"

With this capability, you can create another rule that sends any SPF result other than Pass to Quarantine.   When you review quarantine,  acceptable senders get an allow rule like the one above, unacceptable senders get a block rule, no sender needs to be quarantined more than once.  

This type of local policy requires a product that can implement a multiple-attribute rule based on host name, fcDNS result, and Mail From domain.    I found very few products that could do a multiple-attribute rule of any kind, and the exceptions do not support rules based on fcDNS results.

Instead, you will find products that do this:
  • Any SPF result other than FAIL is acceptable.   The product can only block malicious impersonation if the domain owner wants to block malicious impersonation.
  • If a wanted message produces SPF Fail, the solution is to whitelist that domain.   Whitelisting means that the domain is exempt from authentication checks and exempt from content checks, so any impersonation of the whitelisted domain will also be expedited to the recipient.
The same applies to the standard implementation of DMARC:
What you need is a tool that can apply the DMARC test to every message, send results other than Pass to Quarantine, and then create allow rules in local policy for messages that cannot produce Pass.   The allow rules are of the form:   "Treat message as equivalent to DMARC Pass if the SMTP MailFrom domain is example1.com and the Mail From domain is authenticated by SPF or local policy, and the message From domain is example2.com"
 
Instead, you will find the standard implementation looks like this:
  • Any DMARC FAIL with p=Reject is rejected.   The only workaround is to whitelist the domain so that malicious impersonations will also be exempted from authentication checks and content checks.  Rejected messages are usually not retained, so you will have trouble knowing whether a message was blocked incorrectly.   The most common cause of false positives will be messages from mailing lists.
  • Any DMARC FAIL with p=Quarantine is quarantined.   The only way to prevent future messages from being quarantined is to whitelist the domain, with the same problem as above.
  • Any DMARC Fail with p=none is exempt from authentication.   The product can only block malicious messages if the domain owner wants to block malicious messages.
  • Any domain without a DMARC policy is exempt from authentication.    The product can only block malicious messages if the domain owner wants to block malicious messages.
  • Because DMARC makes mailing list messages look suspicious, relatively few domains are willing to publish a DMARC policy other than p=none.   Since a result of p=none is ignored, and since attackers know the DMARC policy of the domain they impersonate, they usually impersonate a domain with p=none or no policy.   Collectively, the test is nearly useless as a security mechanism.
  • DMARC Pass can only be detected if the domain owner publishes a DMARC policy.   Most messages will pass the DMARC test based on SPF Pass with alignment or DKIM pass with alignment, but this result is never detected because the reported result is No Policy.
Once you start enforcing authentication, you learn a lot while doing quarantine reviews.   My most recent learning is that I need sometimes, the Reply-To address indicates the true author, so Reply-To reputation needs to be checked any time that its domain is different from both the SMTP Mail From and message From domains.

I have also learned that if the message passes SPF, I don't need to worry very much about alignment with the From address.   This has been a convenient surprise as I have sorted out what my own definition of what "100% acceptable authentication" means to me.

This approach also requires a good message review tool that includes all messages, whether blocked, quarantined, or allowed.

Reply to Thread

Enter the verification text