Key takeaways:
- Gmail blue checkmark uses BIMI, DKIM, and VMC to verify sender identity.
- Google patched the 2023 SPF exploit to prevent badge spoofing.
- VMC certificates require trademark verification and legal validation.
- DMARC policy “p=reject” blocks unauthorized email spoofing attempts.
- Domain reputation and engagement metrics control checkmark visibility.
- Scammers use look-alike domains instead of direct BIMI spoofing.
- Always verify the sender’s email address, not just the blue checkmark.
The arrival of the Gmail blue checkmark changed how we perceive trust in our inboxes. This feature uses the Brand Indicators for Message Identification (BIMI) standard to give users a visual signal that an email is legitimate. But as with any security layer, many wonder if a clever attacker can bypass this system. Can a scammer actually spoof that little blue badge?
The 2023 Exploit: When Scammers Faked the Badge
In mid-2023, a security researcher named Chris Plummer proved that the Gmail blue checkmark was not invincible. He found a bug that allowed attackers to trick Gmail into displaying a verified checkmark on a fraudulent email. By using a specific type of vulnerability related to how Google handled SPF, he successfully made a fake email from UPS look completely official.
At the time, Gmail relied heavily on SPF checks to trigger the BIMI logo. Attackers found ways to use misconfigured mail servers on shared platforms to pass these checks. This flaw meant a scammer could technically “buy” trust they did not earn.
How Google Secured the System
Google treated this as a high-priority fix and quickly updated its verification logic. To stop people from faking the checkmark, they implemented several strict rules:
DKIM Is Now Mandatory
Google no longer grants a checkmark based on SPF alone. Senders must use DKIM to provide a cryptographic signature.
Stricter Alignment
The system now checks that the sender domain matches the authenticated domain much more closely.
VMC Requirements
Most brands must have a Verified Mark Certificate (VMC) from an official authority like Entrust or DigiCert to show the badge at all.
Why a VMC is the Real Barrier
The most significant hurdle for anyone trying to fake the checkmark is the VMC. Unlike standard SSL certificates that anyone can buy for a few dollars, a VMC requires a rigorous validation process. To get one, an organization must prove they own the trademark for its logo.
- Trademark Verification: To qualify, your logo must be a registered trademark with an official intellectual property office.
- Manual Validation: Authorities like DigiCert or Entrust perform a manual check of trademark records to ensure the applicant is the rightful owner.
- Legal Documentation: Because this process involves human intervention and legal paperwork, it is extremely difficult for a scammer to obtain a certificate for a brand they do not own.
- Visual Trigger: Without this verified certificate, the blue checkmark simply will not appear in Gmail, which makes it a huge deterrent against high-level impersonation.
The Role of Domain Reputation and Warm-up
Even if a sender has all the technical records in place, Google uses internal reputation signals to decide if the checkmark should show up. A perfect DMARC for Gmail setup is only part of the equation.
- History: If a brand suddenly starts sending millions of emails from a new IP address, Google might withhold the checkmark until the sender establishes a history of good behavior.
- Engagement Metrics: Google monitors signals like open rates and how often users mark messages as “not spam.”
- Behavior Monitoring: If the system detects a sudden shift in sending patterns or a spike in user complaints, it can strip the verified status to protect recipients.
- Trust: This layered approach ensures that the checkmark is a reflection of consistent, legitimate activity rather than just a one-time DNS setting.
Can Someone Still Fake It?
Technically, the direct “faking” of the badge through system bugs is much harder today. However, scammers now use “look-alike” tactics. A bad actor might register a domain that looks like a famous brand but contains a tiny typo. If they set up their own Gmail DMARC setup guide correctly and buy a certificate for that fake domain, they can get a checkmark.
The checkmark is “real” because the domain is authenticated, but the domain itself is a fraud. This is why users still need to look at the actual email address, not just the blue icon.
Protecting Your Own Brand
If you want to protect your company from being spoofed, you need to lock down your email security. Using a tool like PowerDMARC helps you reach a “p=reject” policy. This tells Gmail to block any email that tries to use your domain name without your permission.
To get your own legitimate blue checkmark, follow these steps:
- Set up SPF and DKIM: These are the foundations of email trust.
- Move to DMARC Enforcement: You need a policy of “quarantine” or “reject.”
- Get a VMC: You must prove you own your logo through a legal certificate.
- Upload your SVG logo: Ensure your brand logo meets the specific BIMI format requirements.
The blue checkmark is a great step forward, but it works best when combined with real human awareness and strong technical protocols.
So, How Do You Get Your Own Blue Checkmark?
If you’re running a business and want that “verified” status to stop scammers from hijacking your brand’s reputation, you can’t just flip a switch. It’s a bit of a technical hurdle, but it’s the only way to prove to Google (and your customers) that you’re the real deal.
Here is the “No-BS” checklist to get it done:
1. Lock Down Your DNS
You need SPF and DKIM set up correctly first. Think of these as your digital ID cards. Once those are live, you have to move your DMARC policy to “Enforcement” (either p=quarantine or p=reject). If your policy is still set to p=none, Google won’t even look at your logo.
2. Choose Your Certificate (VMC vs. CMC)
Until recently, you had to have a registered trademark to get a badge. That’s changed slightly:
- VMC (Verified Mark Certificate): This is for the big players with registered trademarks. It’s the gold standard and offers the highest level of protection.
- CMC (Common Mark Certificate): This is the “new kid on the block.” It’s designed for brands that have been using a logo for a long time but don’t have an official trademark registration. It still requires a background check, but it’s a lifesaver for smaller companies.
3. The “SVG Tiny 1.2” Headache
This is where most people trip up. You can’t just upload a JPEG or a standard SVG. Google requires a very specific file type called SVG Tiny 1.2.
- No “Cheating”: You can’t just take a photo and save it as an SVG. It has to be a pure vector.
- Square is King: Your logo needs to be perfectly centered in a square, or it’ll look like a mess when Gmail crops it into that little circle.
- Secure Hosting: Your logo file must be hosted on an https:// URL, or it will be ignored.
4. Publish Your BIMI Record
Once you have your certificate and your formatted logo, you publish a BIMI TXT record on your domain. This tells Gmail exactly where to find your “proof of identity” so it can display that blue checkmark next to your name.
Summing It Up
It is no longer a simple task to fake a Gmail blue checkmark. While a major vulnerability made it possible in 2023, Google has since slammed that door shut by requiring DKIM and VMCs. Today, a blue checkmark is a very reliable sign of authenticity, provided you still keep an eye on the actual sender address. For brands, it is the gold standard for trust, but it requires a mix of legal trademarking and technical precision to maintain.
Frequently Asked Questions
Is the blue checkmark available for free?
No. While the Gmail feature itself does not cost money, the Verified Mark Certificate required to trigger it usually involves an annual fee from a certificate authority.
Can I get the checkmark without a trademark?
Currently, no. Google requires a VMC, and VMC issuers require a registered trademark to prove you own the logo.
Does every authenticated email get a checkmark?
Not necessarily. You need BIMI records, a VMC, and a strong domain reputation. If Google thinks your emails look spammy, they might hide the checkmark.
Can hackers steal a blue checkmark?
Hackers cannot “steal” the icon, but if they compromise a legitimate brand’s email account, they can send emails that carry the checkmark. Always use multi-factor authentication to prevent this.

