Sim, ele é chamado de falsificação de e-mails
The technique is now used ubiquitously by bulk email software as a means of concealing the origin of the propagation. On infection, worms such as ILOVEYOU, Klez and Sober will often try to perform searches for email addresses within the address book of a mail client, and use those addresses in the From field of emails that they send, so that these emails appear to have been sent by the third party. For example:
Alice is sent an infected email and then the email is opened, triggering propagation. The worm finds the addresses of Bob and Charlie within Alice's address book. From Alice's computer, the worm sends an infected email to Bob, but the email appears to have been sent by Charlie.