Use Case: BEC - Scam
Discover how Abnormal stops malicious payroll or other financial requests that appear to come from legitimate senders.
Learn More

Watch the video to see a real business email compromise scam detected by Abnormal.
Video Transcript
Abnormal can detect and stop malicious payroll diversion or other financial scams that appear to come from legitimate senders.
This example is an attack type that, like you, many organizations frequently face.An attacker, pretending to be an employee, attempts to engage with the recipient in a request to modify their payroll information.
This attack's simplicity makes it difficult for secure email gateways to detect. The attack vector is a text-based email with no links or attachments, and since this message is coming from a valid domain, in this case, Gmail, it will pass all traditional authentication methods, like SPF, DKIM, and DMARC.
So how was Abnormal able to detect this type of attack?
Abnormal creates a behavior profile of every identity that interacts with your organization, and here we can see how it flagged the unusual sender trying to engage with the organization.
Our natural language processing models identified that this message involved a direct deposit request, and the solution knows that this type of request is typically associated with payroll fraud.
Using these and other signals, the solution concluded that this message was malicious and automatically remediated it, eliminating the possibility of engagement by the recipient.
Discover more about how Abnormal detects and blocks payroll diversion scams and other business email compromise attacks by requesting your personalized demo today.
See the Abnormal Solution to the Email Security Problem
Protect your organization from the full spectrum of email and collaboration application attacks with Abnormal.See a Demo
