Abstract White Wavy

Q2 2022 in Review: Abnormal Moments You May Have Missed

We’re dedicated to keeping security professionals informed about the latest email threats. Here are a few of our favorite blog posts from Q2 2022.

July 1, 2022

At Abnormal Security, we’re committed to being a valuable partner to the cybersecurity community. Along with providing technology that helps organizations protect their workforce from modern email attacks, we continually share content on the topics that matter most to security professionals. Our blog posts explore current trends, provide insights on the latest data, and offer actionable advice from industry experts.

With constantly evolving threats and new intelligence available almost daily, we’ve been publishing quite a bit lately. We want to make sure you have the opportunity to read all of the news and insights that can help you better safeguard your organization against advanced attacks.

Here are a handful of posts from the last few months we wanted to highlight.

Threat of Phishing In Line

According to the FBI, successful phishing attacks have increased by 34% in the last year, making it the most common email threat organizations face. On top of that, Abnormal data shows that 77% of all advanced email attacks contain a phishing link.

Phishing emails can open the door to more damaging and costly cybercrimes, which means it's critical to stop them before they reach employee inboxes. Learn why phishing emails are so dangerous and what you can do to stop them.

Read "Tackling the Increasing Threat of Phishing" >>

Blocking Advanced Attacks In Line

Secure email gateways (SEGs) were built to block traditional email attacks that contain known indicators of compromise within on-premises environments. But modern attacks don’t contain these traditional indicators, and more organizations adopt cloud-based email every day.

With high-impact email attacks on the rise, relying on a SEG could be doing more harm than good, providing your team with a false sense of security. See why SEGs can’t block advanced attacks in this webinar recap featuring Hunter Hogan from Microsoft.

Read "Blocking the Advanced Attacks Your SEG Never Could" >>

67 Chance of Supply Chain Compromise Attack In Line

In a supply chain compromise attack, a threat actor either uses a compromised vendor email account or impersonates an external third party to redirect the flow of company funds. Supply chain compromise attacks are specifically designed to bypass traditional email security and can cause substantial financial loss.

Our research uncovered some startling statistics about these email attacks and the growing risk they pose. Learn why these attacks represent a significant threat to organizations of all sizes.

Read "New Research Shows 67% Chance of Financial Supply Chain Compromise Attack" >>

Active Ransomware Groups In Line

Ransomware actors have proven that they're focused on one thing: making money in whatever way possible. Ransomware continues to be a significant threat vector across all industries and countries, and threat actors are targeting organizations with annual revenue as low as $8 million.

We took a close look at the ransomware ecosystem and analyzed some of the most high-profile groups of the past two years. Discover more about the 62 most prominent ransomware groups and their activities since January 2020.

Read "A Deep Dive into Active Ransomware Groups" >>

Stripe Credential Phishing In Line

While the core elements of most credential phishing attacks have stayed consistent throughout the 2000s, the ways modern cybercriminals approach creating phishing sites are becoming increasingly more elaborate.

In a recent attack, the threat actor leveraged a man-in-the-middle framework—capable of displaying live content and bypassing multifactor authentication—to recreate Stripe’s entire website to steal login credentials. See how it was executed and how Abnormal was able to stop it.

Read "Stripe Website Impersonated in Credential Phishing Attack" >>

Browse Our Library of Helpful Resources

In addition to our blog, we have a wealth of guides, white papers, on-demand webinars, and more available in our Resource Center—like our latest threat intelligence report, From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise.

Starting in January 2022, vendor impersonation outranked executive impersonation in business email compromise attacks, and that trend has continued each month since. Find out why this is the case (hint: you only have one CEO but hundreds of vendors!) and get insight into the four most common types we've noticed. Download the report now.


Sign up for our blog newsletter to get the latest posts delivered to your inbox. Just enter your email address in the dark green box on the right side of the page to subscribe.

Image

Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 1500x1500 Gartner Peer Insights Reviews blog
The Abnormal Security team is committed to providing the best possible solution and support experience to every customer. Here’s what a few of our customers have to say about us.
Read More
B Podcast Engineering 10 07 27 22
In episode 10 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sits down with Zehan Wang, co-founder of Magic Pony.
Read More
B 1500x1500 Email Attack Insights
Join us for a three-part webinar series about the most serious email-based threats, featuring some of the biggest names in cybersecurity.
Read More
B 07 22 22 Webinar Recap
Credential phishing attacks can lead to loss of revenue, loss of data, and long-term reputational damage. Learn why these attacks are successful and how to block them.
Read More
B 07 19 22 2022 Email Security Trends 1
Our new survey explores the current email threat landscape and what security leaders are doing to stay ahead of increasingly sophisticated attacks.
Read More
B 07 14 22 4types
Understanding the ways cybercriminals execute financial supply chain compromise is key to preventing your organization from falling victim to an attack.
Read More
B 07 07 22 Financial Supply Chain Compromise
Financial supply chain compromise, a subset of business email compromise (BEC), is on the rise. Learn how threat actors launch these sophisticated attacks.
Read More
B 06 15 22 Coats Webinar Recap Blog
Learn why Coats, the global leader in industrial thread manufacturing, skipped the SEG and chose Abnormal Integrated Cloud Email Security (ICES) to protect its workforce from modern email threats.
Read More
B 07 30 22 Q2 2022
We’re dedicated to keeping security professionals informed about the latest email threats. Here are a few of our favorite blog posts from Q2 2022.
Read More
B 06 21 22 Threat Intel blog
Executives are no longer the go-to impersonated party in business email compromise (BEC) attacks. Now, threat actors are opting to impersonate vendors instead.
Read More
B 06 7 22 Disentangling ML Pipelines Blog
Learn how explicitly modeling dependencies in a machine learning pipeline can vastly reduce its complexity and make it behave like a tower of Legos: easy to change, and hard to break.
Read More
B 04 07 22 SEG
As enterprises across the world struggle to stop modern email attacks, it begs the question: how are these attacks evading traditional solutions like SEGs?
Read More