Find more resources about COVID-19-related email attacks in our COVID-19 Resources Center

Stop COVID-19 email attacks

The only enterprise email security solution taking a data science approach and stopping targeted COVID-19 and other social engineering attacks.

  • Business Email Compromise
  • Email Account Compromise
  • Internal Email Attacks
  • …and other targeted attacks
Download Our White Paper

Today’s attacks are landing in employee inboxes because they are:

  1. 01

    Targeted and Unique

    Content is unique, bypassing pattern-matching and reputation systems.

  2. 02

    No Links / Attachments

    Many social-engineering attacks are payload-less and evade sandbox analysis.

  3. 03

    From Trusted Accounts

    Attacks often circumvent authentication by leveraging trusted accounts: domains such as gmail or compromised internal/vendor accounts.

Today’s attacks take advantage of the trust in the fabric of our primary business communications: email.

Abnormal: The Cloud Email Security Platform for Office 365 & G Suite

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

  • Business Email Compromise

    • Exec/Employee Impersonation
    • Vendor Impersonation
  • Account Take Over

    • Email Account Compromise
    • Vendor Email Compromise
  • Internal Email Attacks

    • Internal Credential Phishing
    • Internal Invoice Fraud Attacks
Learn about the product

The Abnormal Difference


Internal Email Protection

Visibility into internal email and additional data sources via API (e.g., directory, authentication, etc.) enabling detection of email account compromise and the ability to protect against internal email attacks.

Learn more


ABX Technology

Abnormal Behavior Technology (ABX) is the unique triangulation between the Identity Model, Relationship Graph, and Content Analysis - leading to high confidence decisions of good and bad email.

Learn more


Fast and Easy Integration

API-based integration takes seconds. No need to change MX records or update mail routing. Abnormal requires no configuration, leading to fast time-to-value.

Learn more



SOC 2 Type 2 Compliant

SOC 2 Type 2 compliance highlights the service commitment to the security and confidentiality of customer data.

Learn more