chat
expand_more

Abnormal Attack Repository

Learn about advanced email attacks that are bypassing legacy tools and the next generation tools required to protect today’s email environments.
Title & Description
Date
Type

Attackers Use Amazon Web Services Cloud Infrastructure to Create Malicious URLs

Threat actors leverage AWS S3 cloud infrastructure to effectively thwart SEGs like Proofpoint.
October 2, 2024
Spear Phishing

Extortion/Sextortion Attacks Continue to Proliferate

These attacks prey on human emotion and are frequently text-based, often harnessing generative AI to sound more realistic.
September 6, 2024
Extortion

Threat Actors Leverage Compromised Vendor for Spear-Phishing Attack

Attacks like this from the supply chain ecosystem thwart SEG solutions like Proofpoint.
September 6, 2024
Credential Phishing

Abnormal Customers are Protected from Phishing Attacks Exploiting Proofpoint

For the last 6 months, Abnormal has stopped the EchoSpoofing campaign.
September 6, 2024
Credential Phishing