Abnormal Attack Repository
Learn about advanced email attacks that are bypassing legacy tools and the next generation tools required to protect today’s email environments.
Title & Description
Date
Type
The Bait of Broken Files: Phishing Campaign Using Corrupted Word Docs
Leveraging corrupted attachments to evade SEGs.
December 17, 2024
Credential Phishing
Creative Phishing in the Cloud: Threat Actors Leverage Adobe Services
Financially themed Adobe documents evade traditional SEGs.
December 16, 2024
Credential Phishing
Executive Impersonation: The BEC Hunt for Customer Payment Records
C-suite impersonation used to extract sensitive financial information.
December 13, 2024
Business Email Compromise
Drag-and-Drop-and-Deceive: Build Your Own Phishing Site
Successful Account Takeover (ATO) leading to Lateral Phishing bypassing SEGs.
November 29, 2024
Credential Phishing
Signed and Compromised: Credential Phishing Through Legitimate DocuSign
Leveraging Document Signature Service to Bypass Traditional SEGs
November 22, 2024
Credential Phishing
Zooming In on Phishing: How Shared Documents Reel You In
Credential Phishing Documents Shared Through Zoom Bypass Traditional SEGs
November 19, 2024
Credential Phishing
From Email to Telegram: HTML Smuggling in Action
Dynamic Phishing Interface Rendered Locally Bypassing Microsoft Defender O365
November 15, 2024
Credential Phishing
An Image With a Link That Hooks You Without a Word
Interactive images are being used to evade traditional SEGs by mimicking legitimate messages and sources.
October 31, 2024
Credential Phishing