Email Bombing
This detection identifies email bombing attacks where adversaries flood targeted mailboxes with high volumes of inbound messages to disrupt operations, bury legitimate security alerts, or distract victims from concurrent malicious activity. The detection monitors for abnormal spikes in inbound email volume to specific recipients within short time windows, particularly identifying patterns consistent with automated list-subscription bombing (many unique senders, low-value content, rapid delivery) versus legitimate bulk mail. Email bombing is frequently observed as a precursor to vishing attacks where threat actors (notably Storm-1811) follow up with fraudulent IT support calls, making timely detection critical for preventing downstream credential theft or ransomware deployment.
let VolumeThreshold = 100;
let TimeWindow = 30min;
let LookbackPeriod = 2h;
EmailEvents
| where Timestamp > ago(LookbackPeriod)
| where EmailDirection == "Inbound"
| where DeliveryAction != "Blocked"
| summarize
EmailCount = count(),
UniqueSenders = dcount(SenderFromAddress),
UniqueDomains = dcount(SenderFromDomain),
SenderDomainSamples = make_set(SenderFromDomain, 20),
SubjectSamples = make_set(Subject, 10),
FirstMessageTime = min(Timestamp),
LastMessageTime = max(Timestamp)
by RecipientEmailAddress, bin(Timestamp, TimeWindow)
| where EmailCount >= VolumeThreshold
| extend
EmailsPerMinute = round(toreal(EmailCount) / 30.0, 2),
SenderDiversityRatio = round(toreal(UniqueSenders) / toreal(EmailCount), 3),
BurstDurationMinutes = datetime_diff('minute', LastMessageTime, FirstMessageTime)
| extend
BombingIndicator = case(
UniqueSenders >= 50 and EmailCount >= 200, "High Confidence - List Subscription Bombing",
UniqueSenders >= 20 and EmailCount >= 100, "Medium Confidence - Automated Bombing",
UniqueSenders < 5 and EmailCount >= 100, "Low Confidence - Single Source Flood",
"Anomalous Volume"
)
| project
WindowStart = Timestamp,
RecipientEmailAddress,
EmailCount,
UniqueSenders,
UniqueDomains,
EmailsPerMinute,
SenderDiversityRatio,
BurstDurationMinutes,
BombingIndicator,
SubjectSamples,
SenderDomainSamples
| order by EmailCount desc Data Sources
Required Tables
False Positives
- Large marketing campaigns or product launches where the organization receives legitimate high-volume replies or registrations
- IT monitoring systems generating notification floods due to alerting misconfiguration or infrastructure incidents affecting many monitored systems simultaneously
- Users who have voluntarily subscribed to multiple high-volume newsletters or mailing lists (adjust threshold or add recipient exclusions for known high-volume users)
- Internal all-hands or organization-wide email distributions that generate large reply volumes
- Conference or event registration confirmations and subsequent mailing list enrollments following legitimate user sign-ups
References (6)
- https://attack.mitre.org/techniques/T1667/
- https://news.sophos.com/en-us/2024/11/19/our-mdr-team-discovers-a-novel-attack-that-uses-teams-and-anydesk-in-combo-with-email-bombing/
- https://krebsonsecurity.com/2016/06/sign-up-for-email-lists-its-a-bomb/
- https://www.hhs.gov/sites/default/files/email-bombing-sector-note-tlpclear.pdf
- https://www.rapid7.com/blog/post/2024/09/17/storm-1811-abuses-quick-assist-in-ransomware-attack/
- https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misuse-quick-assist-in-social-engineering-attacks-leading-to-ransomware/
Unlock Pro Content
Get the full detection package for T1667 including response playbook, investigation guide, and atomic red team tests.