chat
expand_more

Q2 2022 in Review: Abnormal Moments You May Have Missed

We’re dedicated to keeping security professionals informed about the latest email threats. Here are a few of our favorite blog posts from Q2 2022.
July 1, 2022

At Abnormal Security, we’re committed to being a valuable partner to the cybersecurity community. Along with providing technology that helps organizations protect their workforce from modern email attacks, we continually share content on the topics that matter most to security professionals. Our blog posts explore current trends, provide insights on the latest data, and offer actionable advice from industry experts.

With constantly evolving threats and new intelligence available almost daily, we’ve been publishing quite a bit lately. We want to make sure you have the opportunity to read all of the news and insights that can help you better safeguard your organization against advanced attacks.

Here are a handful of posts from the last few months we wanted to highlight.

Threat of Phishing In Line

According to the FBI, successful phishing attacks have increased by 34% in the last year, making it the most common email threat organizations face. On top of that, Abnormal data shows that 77% of all advanced email attacks contain a phishing link.

Phishing emails can open the door to more damaging and costly cybercrimes, which means it's critical to stop them before they reach employee inboxes. Learn why phishing emails are so dangerous and what you can do to stop them.

Read "Tackling the Increasing Threat of Phishing" >>

Blocking Advanced Attacks In Line

Secure email gateways (SEGs) were built to block traditional email attacks that contain known indicators of compromise within on-premises environments. But modern attacks don’t contain these traditional indicators, and more organizations adopt cloud-based email every day.

With high-impact email attacks on the rise, relying on a SEG could be doing more harm than good, providing your team with a false sense of security. See why SEGs can’t block advanced attacks in this webinar recap featuring Hunter Hogan from Microsoft.

Read "Blocking the Advanced Attacks Your SEG Never Could" >>

67 Chance of Supply Chain Compromise Attack In Line

In a supply chain compromise attack, a threat actor either uses a compromised vendor email account or impersonates an external third party to redirect the flow of company funds. Supply chain compromise attacks are specifically designed to bypass traditional email security and can cause substantial financial loss.

Our research uncovered some startling statistics about these email attacks and the growing risk they pose. Learn why these attacks represent a significant threat to organizations of all sizes.

Read "New Research Shows 67% Chance of Financial Supply Chain Compromise Attack" >>

Active Ransomware Groups In Line

Ransomware actors have proven that they're focused on one thing: making money in whatever way possible. Ransomware continues to be a significant threat vector across all industries and countries, and threat actors are targeting organizations with annual revenue as low as $8 million.

We took a close look at the ransomware ecosystem and analyzed some of the most high-profile groups of the past two years. Discover more about the 62 most prominent ransomware groups and their activities since January 2020.

Read "A Deep Dive into Active Ransomware Groups" >>

Stripe Credential Phishing In Line

While the core elements of most credential phishing attacks have stayed consistent throughout the 2000s, the ways modern cybercriminals approach creating phishing sites are becoming increasingly more elaborate.

In a recent attack, the threat actor leveraged a man-in-the-middle framework—capable of displaying live content and bypassing multifactor authentication—to recreate Stripe’s entire website to steal login credentials. See how it was executed and how Abnormal was able to stop it.

Read "Stripe Website Impersonated in Credential Phishing Attack" >>

Browse Our Library of Helpful Resources

In addition to our blog, we have a wealth of guides, white papers, on-demand webinars, and more available in our Resource Center—like our latest threat intelligence report, From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise.

Starting in January 2022, vendor impersonation outranked executive impersonation in business email compromise attacks, and that trend has continued each month since. Find out why this is the case (hint: you only have one CEO but hundreds of vendors!) and get insight into the four most common types we've noticed. Download the report now.


Sign up for our blog newsletter to get the latest posts delivered to your inbox. Just enter your email address in the dark green box on the right side of the page to subscribe.

Q2 2022 in Review: Abnormal Moments You May Have Missed

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B PFPT
Discover how Abnormal Security detected a sophisticated phishing attack that evaded both Proofpoint and DarkTrace, and learn how it outperforms traditional solutions in combating modern email threats.
Read More
B Writing Detection Rules with LL Ms Blog
Discover how Abnormal Security leverages large language models (LLMs) to automate and enhance email threat detection with AI-generated detection rules.
Read More
B MKT628 Cyber Savvy Social Images
Discover key insights from seasoned cybersecurity professional Nicholas Schopperth, CISO at Dayton Children’s Hospital.
Read More
B Podcast Blog
Discover 'SOC Unlocked,' Abnormal Security's new podcast featuring host Mick Leach and cybersecurity expert guests like Jeremy Ventura, Dave Kennedy, and Mick Douglas.
Read More
B 07 22 24 MKT624 Images for Paris Olympics Blog
Threat actors are targeting French businesses ahead of the Paris 2024 Olympics. Learn how they're capitalizing on the event and how to protect your organization.
Read More
B Cross Platform ATO
Cross-platform account takeover is an attack where one compromised account is used to access other accounts. Learn about four real-world examples: compromised email passwords, hijacked GitHub accounts, stolen AWS credentials, and leaked Slack logins.
Read More