T1667

Email Bombing

This detection identifies email bombing attacks where adversaries flood targeted mailboxes with high volumes of inbound messages to disrupt operations, bury legitimate security alerts, or distract victims from concurrent malicious activity. The detection monitors for abnormal spikes in inbound email volume to specific recipients within short time windows, particularly identifying patterns consistent with automated list-subscription bombing (many unique senders, low-value content, rapid delivery) versus legitimate bulk mail. Email bombing is frequently observed as a precursor to vishing attacks where threat actors (notably Storm-1811) follow up with fraudulent IT support calls, making timely detection critical for preventing downstream credential theft or ransomware deployment.

Microsoft Sentinel / Defender
kusto
let VolumeThreshold = 100;
let TimeWindow = 30min;
let LookbackPeriod = 2h;
EmailEvents
| where Timestamp > ago(LookbackPeriod)
| where EmailDirection == "Inbound"
| where DeliveryAction != "Blocked"
| summarize
    EmailCount = count(),
    UniqueSenders = dcount(SenderFromAddress),
    UniqueDomains = dcount(SenderFromDomain),
    SenderDomainSamples = make_set(SenderFromDomain, 20),
    SubjectSamples = make_set(Subject, 10),
    FirstMessageTime = min(Timestamp),
    LastMessageTime = max(Timestamp)
    by RecipientEmailAddress, bin(Timestamp, TimeWindow)
| where EmailCount >= VolumeThreshold
| extend
    EmailsPerMinute = round(toreal(EmailCount) / 30.0, 2),
    SenderDiversityRatio = round(toreal(UniqueSenders) / toreal(EmailCount), 3),
    BurstDurationMinutes = datetime_diff('minute', LastMessageTime, FirstMessageTime)
| extend
    BombingIndicator = case(
        UniqueSenders >= 50 and EmailCount >= 200, "High Confidence - List Subscription Bombing",
        UniqueSenders >= 20 and EmailCount >= 100, "Medium Confidence - Automated Bombing",
        UniqueSenders < 5 and EmailCount >= 100, "Low Confidence - Single Source Flood",
        "Anomalous Volume"
    )
| project
    WindowStart = Timestamp,
    RecipientEmailAddress,
    EmailCount,
    UniqueSenders,
    UniqueDomains,
    EmailsPerMinute,
    SenderDiversityRatio,
    BurstDurationMinutes,
    BombingIndicator,
    SubjectSamples,
    SenderDomainSamples
| order by EmailCount desc
high severity medium confidence

Data Sources

Microsoft Defender for Office 365

Required Tables

EmailEvents

False Positives

  • Large marketing campaigns or product launches where the organization receives legitimate high-volume replies or registrations
  • IT monitoring systems generating notification floods due to alerting misconfiguration or infrastructure incidents affecting many monitored systems simultaneously
  • Users who have voluntarily subscribed to multiple high-volume newsletters or mailing lists (adjust threshold or add recipient exclusions for known high-volume users)
  • Internal all-hands or organization-wide email distributions that generate large reply volumes
  • Conference or event registration confirmations and subsequent mailing list enrollments following legitimate user sign-ups

Unlock Pro Content

Get the full detection package for T1667 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections