chat
expand_more

Abnormal Attack Repository

Learn about advanced email attacks that are bypassing legacy tools and the next generation tools required to protect today’s email environments.
Title & Description
Date
Type

The Bait of Broken Files: Phishing Campaign Using Corrupted Word Docs

Leveraging corrupted attachments to evade SEGs.
December 17, 2024
Credential Phishing

Creative Phishing in the Cloud: Threat Actors Leverage Adobe Services

Financially themed Adobe documents evade traditional SEGs.
December 16, 2024
Credential Phishing

Executive Impersonation: The BEC Hunt for Customer Payment Records

C-suite impersonation used to extract sensitive financial information.
December 13, 2024
Business Email Compromise

Drag-and-Drop-and-Deceive: Build Your Own Phishing Site

Successful Account Takeover (ATO) leading to Lateral Phishing bypassing SEGs.
November 29, 2024
Credential Phishing

Signed and Compromised: Credential Phishing Through Legitimate DocuSign

Leveraging Document Signature Service to Bypass Traditional SEGs
November 22, 2024
Credential Phishing

Zooming In on Phishing: How Shared Documents Reel You In

Credential Phishing Documents Shared Through Zoom Bypass Traditional SEGs
November 19, 2024
Credential Phishing

From Email to Telegram: HTML Smuggling in Action

Dynamic Phishing Interface Rendered Locally Bypassing Microsoft Defender O365
November 15, 2024
Credential Phishing

An Image With a Link That Hooks You Without a Word

Interactive images are being used to evade traditional SEGs by mimicking legitimate messages and sources.
October 31, 2024
Credential Phishing