chat
expand_more

Abnormal Attack Repository

Learn about advanced email attacks that are bypassing legacy tools and the next generation tools required to protect today’s email environments.
Title & Description
Date
Type
January 25, 2025

Phishing by Design: Threat Actors Exploit Figma for Social Engineering

Leveraging design collaboration platforms to bypass traditional SEGs.
Credential Phishing
January 17, 2025

Scams by Appointment: Exploiting Google Calendar Invites

Using calendar invites to bypass SEGs.
Business Email Compromise
January 9, 2025

Un-CODE-ing the Threat: How Punycode Powers the Latest BEC Attacks

Decoding the latest BEC tactic bypassing traditional SEGs.
Business Email Compromise
December 17, 2024

The Bait of Broken Files: Phishing Campaign Using Corrupted Word Docs

Leveraging corrupted attachments to evade SEGs.
Credential Phishing
December 16, 2024

Creative Phishing in the Cloud: Threat Actors Leverage Adobe Services

Financially themed Adobe documents evade traditional SEGs.
Credential Phishing
December 13, 2024

Executive Impersonation: The BEC Hunt for Customer Payment Records

C-suite impersonation used to extract sensitive financial information.
Business Email Compromise
November 29, 2024

Drag-and-Drop-and-Deceive: Build Your Own Phishing Site

Successful Account Takeover (ATO) leading to Lateral Phishing bypassing SEGs.
Credential Phishing
November 22, 2024

Signed and Compromised: Credential Phishing Through Legitimate DocuSign

Leveraging Document Signature Service to Bypass Traditional SEGs
Credential Phishing
November 19, 2024

Zooming In on Phishing: How Shared Documents Reel You In

Credential Phishing Documents Shared Through Zoom Bypass Traditional SEGs
Credential Phishing
November 15, 2024

From Email to Telegram: HTML Smuggling in Action

Dynamic Phishing Interface Rendered Locally Bypassing Microsoft Defender O365
Credential Phishing
October 31, 2024

An Image With a Link That Hooks You Without a Word

Interactive images are being used to evade traditional SEGs by mimicking legitimate messages and sources.
Credential Phishing