Teams usually discover the limit of DMARC right after doing the hard part correctly.
They lock down SPF, DKIM, and DMARC on example.com, move toward enforcement, and cut off direct spoofing against their real domain. Then a phish shows up from examp1e.com, example-support.com, or an internationalized domain that looks close enough to fool a hurried user.
That is not a DMARC failure.
It is a different problem.
The DMARC specification is explicit about this: DMARC helps against exact-domain spoofing, but it does not address visually similar domains, also called cousin domains, and it does not solve display-name abuse either. If an attacker registers a different domain and authenticates mail for that domain, DMARC for your real domain has nothing to enforce there.
That distinction matters operationally, because the controls and monitoring paths are different.
Admins use a few overlapping terms here:
examp1e.comCommon patterns include:
example.co instead of example.comexamp1e.comexample-login.comrnicrosoft.example where rn resembles mThe Unicode Consortium's security guidance spends a lot of attention on exactly this class of confusable identifiers. That is the broader standards backdrop for homograph risk.
DMARC evaluates the domain in the visible From: header and checks whether SPF or DKIM produced an aligned authenticated domain for that same message.
That means DMARC is excellent at stopping attacks like this:
From: billing@example.comwhen the message did not really come from infrastructure authorized for example.com.
But DMARC does not stop this:
From: billing@examp1e.comIf the attacker owns examp1e.com, publishes SPF, signs with DKIM for examp1e.com, and publishes a DMARC record there, the message can authenticate perfectly for that domain.
From a receiver's point of view, that is not an unauthenticated spoof of example.com. It is authenticated mail from a different domain that merely looks similar to a human.
RFC 7489 says this plainly: DMARC does not address visually similar domain names or abuse of the human-readable display name.
This catches many teams off guard.
DMARC aggregate reports tell you about mail claiming to be from your domain, or at least from your organizational domain in the DMARC reporting sense. They do not give you broad visibility into unrelated lookalike domains registered by other parties.
That means:
example.com DMARC reports can show spoofing attempts against example.comexample.comSo if your monitoring strategy is only "watch DMARC reports", you are protected against one class of abuse and partially blind to another.
Once a lookalike domain is registered, the attacker has options that are annoyingly real-world:
Example Billing or Example Support to make the mail look even closer to the brand.That is why "we have p=reject now" is necessary, but not sufficient.
The defense is not one feature. It is a stack:
DMARC is step 1, not the entire playbook.
The best monitoring programs do not alert on every vaguely similar string. They prioritize domains that are both similar and operationally relevant to phishing.
The highest-signal indicators are usually these:
Start with domains that resemble:
The important point is recency. A brand-new domain that looks like yours is more interesting than an old parked domain that has been inactive for years.
If a suspicious lookalike publishes MX records, that is a meaningful escalation signal. It means the domain is set up to receive mail, which supports reply-based phishing, credential collection, or broader business-email-compromise workflows.
This is another common misunderstanding: seeing authentication on the cousin domain is not reassuring.
It can be the opposite.
If a newly registered lookalike domain suddenly publishes:
that often means someone is preparing to send mail that survives basic authentication checks. An attacker does not need to fail DMARC to abuse a lookalike. They can pass DMARC for their own deceptive domain.
A domain with:
deserves much higher priority than a passive registration with no content.
For homograph defense specifically, monitor the punycode form as well as the rendered Unicode form. Domains that begin with xn-- are not automatically malicious, but they deserve review when they are visually close to your brand.
Unicode security guidance also recommends confusable detection and mixed-script analysis for identifiers. That is directly relevant when deciding which IDNs should be escalated instead of ignored.
Cousin-domain defense is not only an external-brand-monitoring problem.
Look for these internal signals too:
This is where secure email gateways and mailbox-provider impersonation protections earn their keep. They are evaluating signals that DMARC alone was never designed to cover.
Do not send every possible typo domain to legal, security, and IT at once.
Use a short triage model instead:
Escalate immediately when a lookalike domain is:
Track closely when a domain is:
De-prioritize domains that are:
Without prioritization, monitoring becomes alert fatigue very quickly.
Many teams ask whether they should defensively register typo and homograph variants.
Sometimes yes, but not indiscriminately.
Registering every theoretical variant across every TLD is endless and expensive. A better approach is to cover:
Defensive registration reduces risk for the highest-probability cases. It does not replace monitoring, because attackers can still choose variants you did not buy.
The response workflow should be straightforward:
If the domain is actively sending mail, this should not wait for a perfect investigation package.
This is one of the places where technical controls and human process have to meet.
Users should know that:
That sounds basic, but it is exactly how cousin-domain phish gets through: the mail may look professionally authenticated, because for the attacker's domain it is.
The clean mental model is:
Those are related, but not interchangeable.
If DMARC rollout is still in progress, start there first. What is DMARC? and How to prevent email spoofing cover the exact-domain side. But once DMARC is stable, lookalike-domain monitoring becomes part of the next maturity layer.
Three assumptions cause the most confusion here:
Only when the impersonation uses your actual domain.
No. It may have passed DMARC for the attacker's own lookalike domain.
Usually not, unless the attack involves your real domain or a domain you also own and monitor.
DMARC is the right control for exact-domain spoofing, and every serious sender should still deploy it fully.
But DMARC was never meant to solve cousin domains, homograph domains, or display-name impersonation. Those require separate monitoring, separate triage, and separate response paths.
If your real domain is already protected, the next question is not "do we need DMARC more?"
It is: "who is watching the domains that only look like us?"