Research
/
Attack Library
/
Attack Glossary
/
Subscribe
Abnormal Intelligence Research
Uncover the latest information on attacker strategies and trends across the email threat landscape.
Blog Posts
View All Research
Blog
Filter by topic
Blog
Adversary-in-the-Middle Tactics Elevate Dropbox Phishing Attack Capitalizing on Open Enrollment
November 18, 2024
Piotr Wojtyla
Read More
Blog
Cybercriminals Use Evilginx to Bypass MFA: Gmail, Outlook, and Yahoo Among Top Targets
September 19, 2024
Dan Kelly
Read More
Blog
Protecting Your Microsoft Accounts: Understanding the Top 5 Cyberattack Tactics
September 4, 2024
Dan Kelly
Read More
Blog
Education Sector Hit Hard: 650,000 Emails Exposed in Recent Cyberattacks
August 28, 2024
Dan Kelly
Read More
Blog
Threat Report: BEC and VEC Attacks Continue to Surge, Outpacing Legacy Solutions
August 21, 2024
Callie Hinman
Read More
Blog
File-Sharing Fraud: Data Reveals 350% Increase in Hard-to-Detect Phishing Trend
August 14, 2024
Callie Hinman
Read More
Blog
The Price of Secrets: How Initial Access Brokers Value Corporate Access Credentials
August 13, 2024
Dan Kelly
Read More
Blog
French Companies Face Olympic-Sized Cyber Threats
July 23, 2024
Dan Kelly
Read More
Blog
Cross-Platform Account Takeover: 4 Real-World Scenarios
July 22, 2024
Dan Kelly
Read More
Blog
5 Unique Ways Hackers Compromise Accounts That Aren’t Phishing
July 15, 2024
Dan Kelly
Read More
Blog
Cybercriminals Pose as Unofficial Travel Agents to Scam Consumers
June 18, 2024
Dan Kelly
Read More
Blog
Spotlighting BEC Attacks in Europe: A Region At Risk
June 11, 2024
Callie Hinman
Read More
Blog
Cybercriminals Exploit B2B Lead Generation Tools for Business Email Compromise Attacks
June 5, 2024
Dan Kelly
Read More
Blog
How Cybercriminals Attempt to Dodge Prosecution With Legal Disclaimers
May 21, 2024
Dan Kelly
Read More
Blog
Cybercriminals Exploit Docusign with Customizable Phishing Templates
May 15, 2024
Dan Kelly
Read More
Blog
SendGrid And Mailtrap Credentials Sold On Cybercrime Forums For Just $15
April 25, 2024
Dan Kelly
Read More
Adobe Acrobat Sign Impersonators Use Customized Phishing Pages in Email Attacks
April 18, 2024
Callie Hinman
Read More
Blog
Zooming In: 6 Ways Cybercriminals Use the Black Market to Steal Zoom User Data
April 16, 2024
Dan Kelly
Read More
Blog
Behind the Screens: Real-World Examples of Thread Hijacking and Multi-Persona Attacks
April 3, 2024
Jace Holyoak
Read More
Blog
Top QR Code Attack Targets: Construction and Professional Services
March 22, 2024
Callie Hinman
Read More
Blog
Hooked on Phishing: The 5 Most Popular Themes That Encourage Users to Click
February 20, 2024
Mike Britton
Read More
Blog
Threat Report: BEC and VEC Attacks Show No Signs of Slowing
February 15, 2024
Callie Hinman
Read More
Blog
C-Suite Under Siege: Data Shows Execs Receive 42x More QR Code Attacks
February 6, 2024
Callie Hinman
Read More
Blog
Financial Services Organizations Experience 137% Increase in Vendor Email Compromise in 2023
January 17, 2024
Mick Leach
Read More
Blog
Uncovering AI-Generated Email Attacks: Real-World Examples from 2023
December 19, 2023
Mike Britton
Read More
Blog
BazarCall Attack Leverages Google Forms to Increase Perceived Credibility
December 13, 2023
Mike Britton
Read More
Blog
Disney+ Impersonated in Elaborate Multi-Stage Email Attack with Personalized Attachments
December 5, 2023
Mike Britton
Read More
Blog
Defensive AI, Deepfakes, and the Rise of AGI: Cybersecurity Predictions and What to Expect in 2024
November 30, 2023
Jade Hill
Read More
Blog
Attackers Exploit Middle East Crisis to Solicit Fraudulent Cryptocurrency Donations for Children
November 16, 2023
Mike Britton
Read More
Blog
Threat Actors Capitalize on Bittrex Bankruptcy to Launch Targeted Phishing Attack
November 9, 2023
Mike Britton
Read More
Blog
How Security Leaders Are Reacting to Generative AI: 98% Worried About the Risk
October 24, 2023
Jade Hill
Read More
Blog
Healthcare Organizations Experience 279% Increase in Business Email Compromise in 2023
September 26, 2023
Mike Britton
Read More
Blog
The Nigerian Prince is Alive and Well: Cybercriminals Use Generative AI and New Themes to Run Their Scams
September 14, 2023
Mike Britton
Read More
Blog
Microsoft Impersonated Most in Phishing Attacks Among Nearly 350 Brands
August 24, 2023
Mike Britton
Read More
Blog
BEC and VEC Attacks on the Rise in 2023
August 16, 2023
Jade Hill
Read More
Blog
Connected Third-Party Applications Widen Attack Surface Area
August 2, 2023
Jade Hill
Read More
Blog
$4.45 Million: The Cost of a Data Breach in 2023, Says IBM
July 27, 2023
Ryan Schwartz
Read More
Blog
VEC Attacks on Replay: Attackers Use the Same Message to Target Victims in Critical Infrastructure
July 26, 2023
Mike Britton
Read More
Blog
New FBI Data Shows Business Email Compromise as Your $51 Billion Threat
July 11, 2023
Jade Hill
Read More
Blog
Generative AI Enables Threat Actors to Create More (and More Sophisticated) Email Attacks
June 14, 2023
Dan Shiebler
Read More
Blog
Israel-Based Threat Group Launches Multi-Phase BEC Attacks Using an M&A Lure
May 16, 2023
Mike Britton
Read More
Blog
Stopping Vendor Email Compromise in Action: Threat Actors Request Invoice for $36 Million
March 22, 2023
Mike Britton
Read More
BEC Groups Wage Multilingual Executive Impersonation Attacks Targeting Companies Worldwide
February 16, 2023
Crane Hassold
Read More
Blog
28% of BEC Attacks Opened by Employees, New Data Shows
February 8, 2023
Callie Hinman
Read More
Blog
BEC Group Incorporates Secondary Impersonated Personas and Lookalike Domains in Convincing Third-Party Reconnaissance Attacks
February 1, 2023
Crane Hassold
Read More
Blog
Phishing Attacks Pose as Updated 2023 HR Policy Announcements
January 19, 2023
Crane Hassold
Read More
Blog
What’s in a Name? How the Abnormal Intelligence Team Names BEC Threat Groups
December 15, 2022
Crane Hassold
Read More
The Double-Edged Sword of ChatGPT: How Threat Actors Could Use It for Evil
December 12, 2022
Crane Hassold
Read More
Blog
BEC Group Compromises Personal Accounts and Pulls Heartstrings to Launch Mass Gift Card Attacks
November 30, 2022
Crane Hassold
Read More
Blog
Q3 2022: Ransomware Activity Levels Off, but the Landscape is More Centralized Than Ever
November 14, 2022
Crane Hassold
Read More
Blog
Crimson Kingsnake: BEC Group Impersonates International Law Firms in Blind Third-Party Impersonation Attacks
November 3, 2022
Crane Hassold
Read More
Blog
BEC Group Uses Manufactured Email Threads and Brand Impersonation to Facilitate Invoice Fraud
October 4, 2022
Crane Hassold
Read More
Abnormal Commentary: American Airlines Breach Highlights Impact of Credential Phishing
September 23, 2022
Jade Hill
Read More
Blog
Back to School: BEC Group Targets Teachers with Payroll Diversion Attacks
September 13, 2022
Crane Hassold
Read More
Blog
Google Drive as a Distribution Method for Matanbuchus Malware
August 18, 2022
Belem Regalado
Read More
Blog
Q2 2022: Ransomware Landscape Continues Its Decline as Another Major Group Shuts Down
August 15, 2022
Crane Hassold
Read More
Blog
New Abnormal Research Shows Rise in Financial Supply Chain Compromise as Attackers Turn to Vendor Impersonation
June 22, 2022
Crane Hassold
Read More
Blog
Stripe Website Impersonated in Credential Phishing Attack
June 2, 2022
Callie Hinman
Read More
Blog
A Deep Dive into Active Ransomware Groups
May 27, 2022
Crane Hassold
Read More
Blog
Hybrid Executive and Vendor Impersonation Attack Uses Fake Email Chain and Fake Invoices
May 19, 2022
Rachelle Chouinard
Read More
Blog
Ransomware Volume Drops as a Main Player Exits the Stage
May 5, 2022
Crane Hassold
Read More
Blog
Attackers Use Legitimate Facebook Infrastructure for Credential Phishing
April 20, 2022
Callie Hinman
Read More
Blog
New Research Shows 67% Chance of Supply Chain Compromise Attack
April 13, 2022
Jade Hill
Read More
Blog
BEC Attacks Increase by Astounding 84%, New Research Shows
April 7, 2022
Jade Hill
Read More
Blog
Tax Return Customer Campaign Attempts to Infect Victims with Sorillus RAT
April 6, 2022
Belem Regalado
+1
Read More
Blog
Unlucky #7: FBI Data Shows BEC Is the Top Cyber Threat for Seventh Year in a Row
March 24, 2022
Crane Hassold
Read More
New Research Shows Phone Fraud Targets 89% of Companies
March 22, 2022
Jade Hill
Read More
Blog
BazarLoader Actors Initiate Contact via Website Contact Forms
March 9, 2022
Belem Regalado
+1
Read More
Blog
The Victimology of Ransomware: 4,200 Ransomware Victims and Counting
February 23, 2022
Crane Hassold
Read More
Blog
The Driving Factors Behind Today’s Ransomware Landscape
February 4, 2022
Crane Hassold
Read More
Blog
New Ransomware Research Shows Growth Trends Across the Threat Landscape
January 25, 2022
Crane Hassold
Read More
Blog
The Connections Between West African Cybercrime & Business Email Compromise
January 20, 2022
Rachelle Chouinard
Read More
New Travel Scam Variant Targets Tourists Traveling to Canada
December 14, 2021
Rachelle Chouinard
Read More
TSA PreCheck Scam Dupes Travelers into Paying Excess Fees
November 18, 2021
Rachelle Chouinard
Read More
New Quishing Campaign Shows How Threat Actors Innovate to Bypass Security
October 26, 2021
Rachelle Chouinard
Read More
Extortion Spam Emails Continue to Consume Valuable Resources
October 21, 2021
Rachelle Chouinard
Read More
Blog
New Abnormal Research Shows Brute Force Attacks Rise 671%
August 30, 2021
Jade Hill
Read More
Blog
Nigerian Ransomware: An Inside Look at Soliciting Employees to Deploy DemonWare
August 19, 2021
Crane Hassold
Read More