chat
expand_more

Top 5 Alarming Anomalies That Are Evading Your SEG

Secure email gateways simply cannot block modern attacks. Here are the top 5 cyber threats bypassing your SEG.
October 16, 2023

While a secure email gateway (SEG) used to be an effective way to block email attacks, that simply isn’t the case anymore. Free of traditional indicators of compromise and leveraging sophisticated social engineering tactics, modern threats are nearly impossible for traditional email security solutions to detect.

Silently lurking in your cloud environment, these alarming anomalies bide their time until they identify an opportunity to wreak havoc in your organization. And while they appear in many forms, they all have the same goal: exploit vulnerabilities to infiltrate your enterprise.

Read on to learn more about the five most common anomalies targeting your organization and hear from five security leaders who decided to replace their SEGs with an AI-native solution.

5 Sinister Cyber Threats Bypassing Your SEG

Top 5 Alarming Anomalies Reeler

Credential Phishing

Phishing is a social engineering attack in which criminals send fraudulent messages to deceive individuals into divulging sensitive information, such as login credentials. While phishing attacks are commonly conducted through email, attackers can also utilize phone calls and text messages as alternative channels.

Regardless of the delivery method, these attacks typically masquerade as authentic communication from familiar organizations or individuals, often impersonating well-known brands like Microsoft. Phishing is the most popular attack type, accounting for nearly 70% of all advanced email attacks.

“I received an email from Abnormal on a Sunday about a compromised employee email account. Once the account was compromised, the bad actor accessed the account and quickly tried to send a credential phishing email to 500 internal inboxes. With [our SEG], I would have had to grab a computer and spend hours manually remediating. But Abnormal had already logged out and disabled the user’s account, reset the account password, and pulled the phishing emails from the recipients’ mailboxes.”
—Peter Mueller, Systems Programmer, Saskatoon Public Schools
Top 5 Alarming Anomalies Grifty Greta

Business Email Compromise

Business email compromise (BEC) relies on impersonation, typically of an executive or other employee, to steal money from unsuspecting victims. Attackers commonly employ text-based emails and leverage social engineering techniques to establish trust and manipulate recipients into providing sensitive information, updating payroll account details, or sending gift cards.

BEC stands as one of the most financially devastating cybercrimes, resulting in losses of $2.7 billion in the previous year alone.

“Before Abnormal, our SEG let almost every executive impersonation email through. We needed something that could learn and do more than analyze headers. With Abnormal, anything identified as malicious gets stopped and pulled from all accounts.”
—Steve Tieland, Director, Corporate Security Operations, Pegasystems
Top 5 Alarming Anomalies Frauderick

Vendor Email Compromise

A subset of BEC, vendor email compromise (VEC) involves the impersonation of legitimate vendors to deceive targets into making payments for fake invoices, initiating fraudulent wire transfers, or updating banking details for future transactions. In the most sophisticated VEC attacks, threat actors will send an email from a compromised vendor email account to add credibility.

Given that vendor communications frequently revolve around payments, distinguishing these attacks from genuine emails can be extremely challenging. Consequently, they often lead to substantial financial losses. For example, the largest VEC attack stopped by Abnormal involved a request for a staggering $36 million.

“When a malicious actor took over an ongoing vendor conversation, we could see how Abnormal assessed the change of context, the slight nuances in the way the language shifted, the addition of a file with different bank details, and the fact that the attacker interjected an email address into the CC field. I’ve never seen these things detected by a traditional SEG.”
—Jonny Concannon, Group Information Security Manager, Boohoo
Top 5 Alarming Anomalies Malicious Malcolm

Malware and Ransomware

Although malware and ransomware can be distributed through various means, email remains the favored delivery method for cybercriminals. To bypass email security tools that block obvious malware attachments, attackers often employ tactics such as embedding malware files within seemingly legitimate links or attachments.

In more recent cases, cybercriminals utilize payloadless malware, stating that the recipient has been charged a fee that they can reverse by calling the specified phone number. Upon making the call, targets are instructed to download a cancellation document, which, unbeknownst to them, contains a malicious file. These attacks are on the rise, with 89% of organizations being targeted last year.

“On the second day [of the Abnormal Proof of Value], Abnormal called about a malicious email and the indicators they saw. Both of our SEGs had let it go through. Abnormal saved us a lot of money because the message was something that an account manager would respond to quickly if it landed in their inbox.”
—John Mendoza, CISO, Technologent
Top 5 Alarming Anomalies Bobby Beauxgus

Account Takeover

Among the most insidious forms of cyberattacks are those that grant criminals unauthorized access to legitimate accounts. Once accounts have been compromised, attackers can perform a variety of malicious acts, such as exfiltrating sensitive data, infiltrating connected applications, or using the account to send additional email attacks to coworkers, partners, and customers.

Account takeovers can stem from various methods, including successful credential phishing, password stuffing, or brute-force attacks. Shockingly, it has been found that nearly 80% of enterprises have at least one account that has been compromised.

“[Abnormal] picked up 1,000+ attacks that bypassed our SEG. I really like the account compromise feature that autodetects threats and locks users out of those mailboxes. It gives me peace of mind that not only is Abnormal blocking all the attacks, but also that if one actually succeeded, Abnormal auto-remediates that mailbox.”
—Jim Robinson, CIO, SuperConcepts

Keeping Anomalous Activity Out of Your Inboxes

Business communication relies on email, as it is the only universally adopted platform. It also serves a multitude of purposes—connecting individuals with their coworkers, facilitating collaborative work on confidential documents, and enabling payment requests. Consequently, its widespread utility means that it is also a prime target for attack.

Security leaders know this, which is why securing email is a top priority for nearly everyone. But unfortunately, these malicious monsters are in the business of outsmarting the tools put in place to stop them—and they keep trying until they’re successful.

So what do you do about these attacks? To counter these highly sophisticated cyber threats, organizations need the right security platform.

Abnormal’s AI-native email security platform leverages machine learning to stop sophisticated inbound email attacks and email platform attacks that evade traditional solutions like SEGs. The anomaly detection engine uses identity and context to assess risk in every cloud email event, preventing inbound attacks, detecting compromised accounts, and remediating malicious emails in milliseconds.

Increasing Awareness of Malicious Activity

While the right technology will stop these anomalies before your end users can interact with them, that doesn’t negate the importance of security awareness training. It’s vital to ensure that your employees know the latest tactics in email attacks and can identify when an email may be suspicious.

Use the resources in our Cybersecurity Awareness Month Kit to help your employees understand the types of threats targeting them and how they can detect and deter anomalous activity.

Get the Kit
Top 5 Alarming Anomalies That Are Evading Your SEG

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B 2024 Cybersecurity Predictions
As AI becomes more prevalent in the new year, discover how our experts believe the world will change—for both good and bad.
Read More
B 11 27 23 ATO Stats
Account takeover allows threat actors to steal sign-in credentials and access an organization's network. Read some eye-popping stats about ATO cost and frequency.
Read More
B Unmasking Vendor Fraud
Learn about the techniques, tools, and technologies we use to train the models that form the backbone of our vendor fraud detection.
Read More
B ISC2
Get the latest insights from the 2023 ISC2 Cybersecurity Workforce Study, including which skills are most sought-after, how careers have changed, and how AI is affecting the industry.
Read More
B Good Bad Ugly Future of AI
Hear about positive and malicious use cases of AI and how to protect against novel threats in this recap from Chapter 3 of our Convergence of AI + Cybersecurity series.
Read More
B Cryptocurrency Donations Attack
Attackers attempt to solicit fraudulent donations via cryptocurrency transfers under the guise of collecting donations for children in Palestine.
Read More