Display Name Abuse
Email clients show display names prominently while hiding actual addresses; attackers put spoofed identities in display names to deceive users.
MITRE ATT&CK: T1566.001Timeline: The Cat and Mouse
2010 β Attack emerges β 2015 β Partial response β 2019 β Still effective β Present
The Evolution
| Phase | Period | What Happened |
|---|---|---|
| CONTEXT | 2007 | iPhone launches; mobile email begins its rise |
| ATTACK | 2010 | Mobile email clients truncate addresses, show only display names |
| PEAK | 2016-2020 | BEC attacks heavily exploit display name; billions lost |
| RESPONSE | 2015 | Some clients add βshow full addressβ options |
| Β | 2018 | Display name vs domain mismatch warnings |
| Β | 2019 | VIP/Executive impersonation detection in SEGs |
| CURRENT | Present | Still effective; display names remain unauthenticated |
Key Events with Sources
| Date | Event | Significance | Source |
|---|---|---|---|
| 2007 | Mobile email rises | iPhone and smartphones normalize truncated email views | General knowledge |
| 2015 | FBI BEC warnings | Display name abuse identified as key BEC technique | FBI IC3 |
| 2018 | Gmail improvements | Gmail adds warnings for emails from external accounts | Google Blog |
| 2019 | SEG VIP protection | Proofpoint, Mimecast add executive impersonation detection | Proofpoint |
| 2022 | Continued effectiveness | Display name abuse still primary BEC vector | FBI IC3 2022 |
Overview
Email headers have two components: the display name (human-friendly label) and the actual address. Email clients, especially on mobile, prominently show the display name while hiding or truncating the address. Attackers exploit this by putting the impersonated identity in the display name while using their own email address.
The Attack
Email Address Anatomy
From: "John Smith" <john.smith@company.com>
βββββββββββ ββββββββββββββββββββββββ
Display Name Actual Email Address
Email clients show:
- Desktop (expanded):
John Smith <john.smith@company.com> - Desktop (collapsed):
John Smith - Mobile:
John Smith(address often hidden entirely)
The Exploit
From: "CEO Name <ceo@company.com>" <random123@gmail.com>
βββββββββββββββββββββββββββββ ββββββββββββββββββββ
Display Name (what user sees) Actual Address (hidden)
On mobile, user sees: CEO Name ceo@company.com
The actual sending address random123@gmail.com is nowhere visible.
Variations
Executive Impersonation:
From: "Jane Wilson - CEO" <jwilson-ceo@randomdomain.com>
IT/Security Impersonation:
From: "IT Security Team" <security.alert.12345@gmail.com>
Vendor Impersonation:
From: "Accounts Payable - Vendor Inc" <ap-vendor@attacker.com>
Email-in-Display-Name:
From: "boss@company.com" <unrelated@attacker.com>
Why It Works
Mobile-First World:
- Over 50% of emails read on mobile devices
- Mobile clients optimize for space, hide addresses
- Users trained to glance, not scrutinize
User Behavior:
- People recognize names, not addresses
- Urgency in message prevents careful inspection
- Trust in display name is reflexive
Authentication Bypass:
- SPF/DKIM/DMARC check the actual address
- Attackerβs actual address can pass all checks
- Display name is not authenticated
Classic BEC Scenario
To: accounts@company.com
From: "Michael Chen - CFO" <mchen.cfo2024@gmail.com>
Subject: Urgent Wire Transfer
Hi,
I need you to process a wire transfer today. I'm traveling and can't call.
Please wire $47,500 to the attached account details.
Reply to confirm when done.
Michael
The email passes SPF/DKIM for gmail.com. The display name impersonates the CFO. The accounts team sees βMichael Chen - CFOβ and complies.
Raw Email Headers (Display Name Abuse)
The deception is in the From: header display nameβeverything else is legitimate:
Return-Path: <mchen.cfo2024@gmail.com>
Received: from mail-yw1-f178.google.com (mail-yw1-f178.google.com [209.85.128.178])
by mx.company.com (Postfix) with ESMTPS id DEF456
for <accounts@company.com>; Tue, 21 Jan 2025 14:32:15 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=20230601;
h=from:to:subject:date:message-id;
bh=47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU=;
b=XYZ123...
Authentication-Results: mx.company.com;
dkim=pass header.d=gmail.com header.s=20230601;
spf=pass (mx.company.com: domain of mchen.cfo2024@gmail.com
designates 209.85.128.178 as permitted sender)
smtp.mailfrom=mchen.cfo2024@gmail.com;
dmarc=pass (p=NONE sp=QUARANTINE) header.from=gmail.com
From: "Michael Chen - CFO" <mchen.cfo2024@gmail.com>
To: accounts@company.com
Subject: Urgent Wire Transfer
Date: Tue, 21 Jan 2025 14:32:10 -0500
Message-ID: <CA+unique123@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Hi,
I need you to process a wire transfer today...
Key observations:
dkim=passβ Valid Gmail signaturespf=passβ Sent from legitimate Gmail serversdmarc=passβ Aligns with gmail.com (not company.com!)- The display name
"Michael Chen - CFO"is completely unverified - Mobile client shows only: Michael Chen - CFO
Defenses
Email Client Improvements
Some clients now:
- Always show full address on first view
- Warn when display name contains @ symbol
- Highlight when sender is external
- Show banner for first-time senders
SEG VIP Protection
Secure Email Gateways can:
- Maintain list of executive names
- Flag external emails with matching display names
- Quarantine impersonation attempts
- Alert security team
Configuration Example:
Protected Names: "CEO Name", "CFO Name", "Controller Name"
Action: If external sender display name matches β quarantine
User Training
Train users to:
- Tap/click to reveal full address
- Verify unusual requests via phone
- Question urgency that prevents verification
- Report suspected impersonation
Technical Controls
External Email Banners:
[EXTERNAL] This email originated from outside the organization.
Display Name Policy: Some organizations strip display names from external mail entirely.
Current State
Status: Active
Display name abuse remains highly effective:
| Protected | Not Protected |
|---|---|
| Nothing by default | Email authentication |
| VIP names (with SEG config) | Non-executive names |
| First-time sender warnings | Repeated impersonation |
The fundamental problem: email clients prioritize usability over security, and display names are entirely unauthenticated.
Detection Guidance
Email Rules
Flag emails where:
sender.display_name CONTAINS "@"
OR sender.display_name MATCHES known_executive_pattern
AND sender.domain IS external
User Reports
Encourage reporting of:
- Emails from executives requesting unusual actions
- Messages where displayed name doesnβt match expanded address
- Requests for wire transfers, gift cards, or sensitive data
SIEM Correlation
email.display_name IN (executive_names)
AND email.sender.domain NOT IN (internal_domains)
AND email.action IN ("wire transfer", "payment", "gift card", "w2")
Metrics to Track
- Volume of external emails using internal executive names
- User click-through rate on impersonation emails
- Time-to-report for display name attacks
What Killed It (or Weakened It)
| Defense | Introduced | Impact |
|---|---|---|
| Show Full Address Option | 2015 | Email clients add option to always show full email address |
| Display Name vs Domain Mismatch Alerts | 2018 | Some clients warn when display name contains email-like string |
| VIP/Executive Impersonation Detection | 2019 | SEGs flag emails with display names matching internal executives |