Abnormal Attack Repository
Learn about advanced email attacks that are bypassing legacy tools and the next generation tools required to protect today’s email environments.
Title & Description
Date
Type
Attackers Use Amazon Web Services Cloud Infrastructure to Create Malicious URLs
Threat actors leverage AWS S3 cloud infrastructure to effectively thwart SEGs like Proofpoint.
October 2, 2024
Spear Phishing
Extortion/Sextortion Attacks Continue to Proliferate
These attacks prey on human emotion and are frequently text-based, often harnessing generative AI to sound more realistic.
September 6, 2024
Extortion
Threat Actors Leverage Compromised Vendor for Spear-Phishing Attack
Attacks like this from the supply chain ecosystem thwart SEG solutions like Proofpoint.
September 6, 2024
Credential Phishing
Abnormal Customers are Protected from Phishing Attacks Exploiting Proofpoint
For the last 6 months, Abnormal has stopped the EchoSpoofing campaign.
September 6, 2024
Credential Phishing