chat
expand_more

Abnormal Abuse Mailbox: Save Time with AI-Driven Auto-Remediation of Employee-Reported Phishing Emails

For SOC analysts, managing an employee-reported phishing mailbox can be a double-edged sword. On one hand, legacy tools have made it easy for employees to report would-be business email compromise (BEC) and credential phishing emails. On the other hand...
December 17, 2020

For SOC analysts, managing an employee-reported phishing mailbox can be a double-edged sword. On one hand, legacy tools have made it easy for employees to report would-be business email compromise (BEC) and credential phishing emails. On the other hand, analysts spend a significant amount of time manually monitoring and determining if messages are safe or if they need remediating, creating a resource bottleneck.

In many cases, it can take minutes to over an hour to understand the implications behind a phishing report.

Understanding the Phishing Mailbox Workflow

A common phishing mailbox workflow goes like this:

  1. An employee reports a phishing email to the phishing mailbox.
  2. A SOC analyst investigates and decides if the email is safe or malicious.
    1. For safe emails, they inform the employee of the judgement.
    2. For malicious emails, they find the entire email campaign using tools such as Powershell.
  3. The SOC analyst removes the email campaign and alerts the employee of the malicious judgement.

All of these steps require manual intervention, as well as the use of ticketing or third-party tools to manage the mailbox workflow. However, most SOC analysts would prefer minimal involvement when it comes to monitoring their abuse mailbox. However, to get to a “set it and forget it” workflow requires automation and next-generation detection capabilities.

Automate Your Abuse Mailbox

With the Abuse Mailbox built-in to the Abnormal Security platform, we apply our AI-powered inbound protection technology to pass judgement on employee-reported phishing emails. In doing so, we automatically determine if an email—whether it’s a standalone message or a part of a coordinated campaign sent to multiple employees—is safe or malicious. Additionally, all malicious emails, including those a part of a campaign sitting in inboxes that are unreported, are auto-remediated from employee inboxes, giving analysts built-in mSOAR (email Security Orchestration, Automation and Response) capabilities.

Due to the effectiveness of Abnornal’s detection system, the result is a significant time savings for analysts, since they no longer need to spend time investigating safe phishing emails and can instead focus on real threats.

The Abnormal Security Abuse Mailbox can:

  • Pull all employee-reported emails in one place
  • Automatically provide email judgement via Abnormal’s signal detection capabilities
  • Collect the entire email attack campaign
  • Automatically remediate email campaigns that are deemed malicious
  • Automate employee notification support for safe and malicious reports
  • Integrate with existing ticketing systems such as ServiceNow, and SIEM/SOAR tools including Splunk, LogRhythm, QRadar, and Demisto, and
  • Integrate with Proofpoint TAP to show reports that have been ingested and processed by Abnormal

Abuse Mailbox is platform-independent and integrates with both Microsoft Office 365 and Google Workspace.

Experience an Improved Abuse Mailbox Today

With our improved mailbox UI, analysts can quickly view quantitative highlights of the submission breakdown between malicious, safe, and spam messages, as well as remediated campaigns and messages. The high-level summary above the campaign log allows analysts to receive a quick snapshot of Abuse Mailbox’s effectiveness. Additionally, if you’re a Proofpoint TAP customer, we have integrated into TAP to show reports that have been ingested and processed by Abnormal, giving analysts another look at how Abnormal would handle such events.

Multiple Remediation Options: Abuse Mailbox now supports a ‘Malicious (Permanently Delete)’ remediation option for analysts that want to remove entire campaigns from users’ inboxes for both Office 365 and Google Workspace.

Powerful Dashboard and Reporting Capabilities: We’ve added numerous dashboards and reporting options to improve visibility into key metrics and activity across the organization. Analysts can get a roll-up of reported phishing emails with a breakdown by judgement—malicious, safe, and spam. Additionally, Abnormal provides downloadable PDF and CSV reports with custom date ranges, especially useful for an executive audience.

You can also view remediation trends by attack types, and as well as the total number of emails, campaigns, and Proofpoint TAP-reported emails remediated by Abnormal over the selected time period.

In addition, we’ve made it easier to understand which employees in your organization report the most messages to Abuse Mailbox over a selected time period. Analysts can view the types of messages they’re reporting, as well as toggle between ‘All Reports’ or ‘Malicious Reports Only’.

Integrated Phishing Reporting Buttons: For organizations that have an existing end-user phishing report workflow, Abuse Mailbox integrates with Cofense/PhishMe and KnowBe4 buttons, as well as the native Microsoft O365 ‘Report Message’ button, giving employees the ability to report suspicious emails and notify security teams with just one click.

There's no longer a need to spend hours investigating user-report phishing attacks and remediating them. Let Abnormal do it for you.

Interested in seeing what Abnormal Security can do to improve your employee-reported mailbox? Request a demo to learn more.

Abnormal Abuse Mailbox: Save Time with AI-Driven Auto-Remediation of Employee-Reported Phishing Emails

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

B AI Series
Discover how Abnormal's advanced AI models are used to detect abnormalities in email behavior and protect organizations from the most sophisticated email attacks.
Read More
B Insights from Clemson University CISO
John Hoyt, CISO at Clemson University, shares his take on the unique cybersecurity challenges of higher education and how Abnormal Security can help.
Read More
B Nigerian Prince
Scams about the Nigerian Prince that promise millions have been around for decades. But they are transitioning, now using ChatGPT and similar tools to seem more convincing.
Read More
B 9 12 23 ATO
Learn why account takeovers are successful, how to detect and remediate them, and how to better protect yourself from cybercriminals in the future.
Read More
B 9 8 23 Incident Response
An effective incident response plan is crucial to minimizing the effects of an email attack and preventing future breaches.
Read More
B MKT006 09 05 23 Site and Social Images for MDC Blog v02
This company has the best cybersecurity product I’ve ever seen, and we’re primed for a future where AI is the focus. Here’s my thoughts on why.
Read More