chat
expand_more

Abnormal Abuse Mailbox: Save Time with AI-Driven Auto-Remediation of Employee-Reported Phishing Emails

For SOC analysts, managing an employee-reported phishing mailbox can be a double-edged sword. On one hand, legacy tools have made it easy for employees to report would-be business email compromise (BEC) and credential phishing emails. On the other hand...
December 17, 2020

For SOC analysts, managing an employee-reported phishing mailbox can be a double-edged sword. On one hand, legacy tools have made it easy for employees to report would-be business email compromise (BEC) and credential phishing emails. On the other hand, analysts spend a significant amount of time manually monitoring and determining if messages are safe or if they need remediating, creating a resource bottleneck.

In many cases, it can take minutes to over an hour to understand the implications behind a phishing report.

Understanding the Phishing Mailbox Workflow

A common phishing mailbox workflow goes like this:

  1. An employee reports a phishing email to the phishing mailbox.
  2. A SOC analyst investigates and decides if the email is safe or malicious.
    1. For safe emails, they inform the employee of the judgement.
    2. For malicious emails, they find the entire email campaign using tools such as Powershell.
  3. The SOC analyst removes the email campaign and alerts the employee of the malicious judgement.

All of these steps require manual intervention, as well as the use of ticketing or third-party tools to manage the mailbox workflow. However, most SOC analysts would prefer minimal involvement when it comes to monitoring their abuse mailbox. However, to get to a “set it and forget it” workflow requires automation and next-generation detection capabilities.

Automate Your Abuse Mailbox

With the Abuse Mailbox built-in to the Abnormal Security platform, we apply our AI-powered inbound protection technology to pass judgement on employee-reported phishing emails. In doing so, we automatically determine if an email—whether it’s a standalone message or a part of a coordinated campaign sent to multiple employees—is safe or malicious. Additionally, all malicious emails, including those a part of a campaign sitting in inboxes that are unreported, are auto-remediated from employee inboxes, giving analysts built-in mSOAR (email Security Orchestration, Automation and Response) capabilities.

Due to the effectiveness of Abnornal’s detection system, the result is a significant time savings for analysts, since they no longer need to spend time investigating safe phishing emails and can instead focus on real threats.

The Abnormal Security Abuse Mailbox can:

  • Pull all employee-reported emails in one place
  • Automatically provide email judgement via Abnormal’s signal detection capabilities
  • Collect the entire email attack campaign
  • Automatically remediate email campaigns that are deemed malicious
  • Automate employee notification support for safe and malicious reports
  • Integrate with existing ticketing systems such as ServiceNow, and SIEM/SOAR tools including Splunk, LogRhythm, QRadar, and Demisto, and
  • Integrate with Proofpoint TAP to show reports that have been ingested and processed by Abnormal

Abuse Mailbox is platform-independent and integrates with both Microsoft Office 365 and Google Workspace.

Experience an Improved Abuse Mailbox Today

With our improved mailbox UI, analysts can quickly view quantitative highlights of the submission breakdown between malicious, safe, and spam messages, as well as remediated campaigns and messages. The high-level summary above the campaign log allows analysts to receive a quick snapshot of Abuse Mailbox’s effectiveness. Additionally, if you’re a Proofpoint TAP customer, we have integrated into TAP to show reports that have been ingested and processed by Abnormal, giving analysts another look at how Abnormal would handle such events.

Multiple Remediation Options: Abuse Mailbox now supports a ‘Malicious (Permanently Delete)’ remediation option for analysts that want to remove entire campaigns from users’ inboxes for both Office 365 and Google Workspace.

Powerful Dashboard and Reporting Capabilities: We’ve added numerous dashboards and reporting options to improve visibility into key metrics and activity across the organization. Analysts can get a roll-up of reported phishing emails with a breakdown by judgement—malicious, safe, and spam. Additionally, Abnormal provides downloadable PDF and CSV reports with custom date ranges, especially useful for an executive audience.

You can also view remediation trends by attack types, and as well as the total number of emails, campaigns, and Proofpoint TAP-reported emails remediated by Abnormal over the selected time period.

In addition, we’ve made it easier to understand which employees in your organization report the most messages to Abuse Mailbox over a selected time period. Analysts can view the types of messages they’re reporting, as well as toggle between ‘All Reports’ or ‘Malicious Reports Only’.

Integrated Phishing Reporting Buttons: For organizations that have an existing end-user phishing report workflow, Abuse Mailbox integrates with Cofense/PhishMe and KnowBe4 buttons, as well as the native Microsoft O365 ‘Report Message’ button, giving employees the ability to report suspicious emails and notify security teams with just one click.

There's no longer a need to spend hours investigating user-report phishing attacks and remediating them. Let Abnormal do it for you.

Interested in seeing what Abnormal Security can do to improve your employee-reported mailbox? Request a demo to learn more.

Abnormal Abuse Mailbox: Save Time with AI-Driven Auto-Remediation of Employee-Reported Phishing Emails

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B Most Interesting Attacks Q1 2024
Take a look at five of the most unique and sophisticated email attacks recently detected and stopped by Abnormal.
Read More
B MKT499 Images for Customer Blog Series
Discover key industry trends and insights from cybersecurity leader Michael Marassa, CTO of New Trier Township High School District 203.
Read More
B Construction Professional Services QR Code Attacks
Abnormal data shows construction firms and professional service providers are up to 19.2 times and 18.5 times, respectively, more likely to receive QR code attacks than organizations in other industries.
Read More
B 1500x1500 Evolving Abnormal R2
From the beginning, we created Abnormal Security to be a generational company that protects people from cybercrime. Here’s how we’re doing it.
Read More
Blog Cover 1500x1500 Images for SOC Time Blog
Discover the critical tasks that occupy SOC analysts’ schedules beyond mere inbox management, and discover insights into optimizing efficiency in cybersecurity operations.
Read More
B 1500x1500 MKT494 Top Women in Cybersecurity
In honor of Women's History Month, we're spotlighting 10 women leaders who are making invaluable contributions to cybersecurity.
Read More