Go back

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

Product
May 13, 2025
5m read
5m read
5m listen
5m watch
5m watch
Defusing Email Bomb Attacks with Material Security HeaderDefusing Email Bomb Attacks with Material Security Thumbnail
speakers
speakers
speakers
authors
Nate Abbott
Caroline Pierce
Mike Moran, Ph.D.
participants
No items found.
share

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

Email bombs are making a comeback. Whether harassing the victims, obfuscating other attacks, or setting up social engineering attacks, the tactic has become increasingly prevalent – and it’s just as difficult to detect and remediate today as it was back when Discmans were still a thing.

Material Security detects and automatically remediates these attacks, thanks to the platform’s deep historical mailbox context, advanced analytical capabilities, and unique ability to move and reclassify emails post-delivery.

Introduction

Everybody loves the classics: that song you used to listen to every morning on your way to high school. That pair of jeans that’ve gone in and out of style twice since you bought them. That email attack technique from thirty years ago that’s incredibly disruptive and difficult to prevent even with today’s email security tools…

Ok, maybe not that last one.

Email bombs (variously referred to as email flooding, spam bombing, or registration bombing) date back at least to the 1990s. They flood the target’s inbox with hundreds or even thousands of unwanted messages, with the goal to obfuscate another attack, to set the user up for a fraudulent follow-up social engineering attempt, or simply to harass the victim and render the inbox useless. 

Traditional email security tools and even spam filters struggle with these attacks, because for the most part, the emails are by themselves legitimate. They’re signups for newsletters, services, free trials: they’re only attacks in aggregate form.

When Material began seeing increasing variations of this in the wild, our engineers realized our infrastructure was perfectly positioned to address this threat: our API connection to mailboxes provides us with the historical context and control over mailbox behavior to not only detect these attacks when they occur, but remediate them as well. 

So how’d we get here, and much more importantly: how do you deal with it?

Background: the email bomb threat

There are quite a few variations of email bombs, but they all involve hitting an inbox with hundreds or thousands of messages in a very short time. A scalable approach involves using botnets to register the target email account for a variety of online services (newsletters, subscriptions, and so on), leading to a deluge of account verification, confirmation, and welcome emails.

As noted above, this tactic is not new–the first reported case of these types of attack is from almost thirty years ago. But in the last twelve months or so, we’ve seen a dramatic uptick in their prevalence and frequency–along with some nasty variations and evolutions.

The goals of these attacks vary, but they boil down to three basic objectives:

  • Obfuscation - Attacks use email bombs as a means to prevent victims from noticing alerts of other more-damaging attack techniques being employed. For example, an email from your credit card provider calling out an unusual transaction is something most people will usually notice… but if that email is buried within a thousand other emails, the chances the user will see the one meaningful one drops significantly.
  • Setup for Social Engineering Attack - Some campaigns have followed up email bomb attacks with a vishing attack–a phone call from a fraudulent “IT help desk” saying that they noticed the attack, and offering to help the victim remedy it. Once the victim allows remote access to their computer, the adversary may deploy Black Basta or other malware or ransomware.
  • Harassment - Some attacks have sought to do nothing but disrupt the victim’s ability to use their inbox, from public figures to government accounts to cybersecurity reporters.

A customer receiving a targeted harassment campaign led Material to initially begin developing our solution to email bombs. One of our customers’ high-visibility employees were having their inboxes effectively shut down periodically with high volumes of messages designed to do nothing but harass, intimidate, and render their inboxes useless.

As we began developing a response, we looked for other evidence of email floods across our customer base, and found evidence of Storm 1811 , Black Basta, and similar threat actors and attacks. This reinforced the need for robust and flexible protection for all types of email flooding, and convinced us we were on the right path.

Bomb sniffing: detecting the undetectable

Traditional email security tools rarely catch these attacks, as email bombs often make use of perfectly legitimate services. They don’t come from domains of known bad actors, they don’t contain malicious payloads or links and, except for cases of harassment, the language in the emails themselves is perfectly benign. Individually, few if any of the emails within an email bomb would trigger any sort of email security tool. 

Material’s unique approach to email and data security, however, includes syncing and analyzing each enrolled account’s full email history…which includes incoming email volume. This access gives us an interesting way to detect these attacks: by capturing anomalous volumes of incoming email.

Building historical models

We created a historical model of each mailbox’s typical email volume. Early in our development, we realized that what looks like an email bomb for an intern’s mailbox is just another Tuesday for the CEO. 

Based on the email arrival times in the mailbox, we calculated the average emails received per hour, as well as maximum limits, variance, and standard deviation of the distribution. This gives us our baseline against which we can compare potential attacks.

Surge detection logic

Our historical baseline gives us a reliable way to determine significantly anomalous incoming email volume that qualifies as an attack. We took a simple yet powerful approach of comparing the live email arrival rate against this historical baseline, computing the z-score, and escalating when that score was above a particular threshold (which can be adjusted on a per-customer basis as needed), with the threshold set at a certain z-score, or standard deviations above the historical rate of incoming emails. 

We found this approach best suited to the wide variation between inboxes, preventing false alarms for naturally busy accounts, while still catching spikes in quieter inboxes.

If we counted every incoming email, we could raise an alarm for normal communications. To avoid these cases, the platform takes trusted entities and communications from within the organization into account when detecting attacks–both to accurately detect attack volume and to minimize the chances that legitimate (if noisy) communications are detected and remediated as part of the attack. 

Bomb disposal: remediating attacks

Detection is obviously a critical first step, but it’s not like the victims need to be told they’re under attack. Remediation is critical–and this is where Material’s unique capabilities to easily move and reclassify emails after delivery give us superpowers.

When an attack is detected, the platform identifies when the attack started and begins an initial fast filtering. Thanks to Material’s ability to manipulate the mailbox, we’re able to filter emails that were already delivered before the detection was triggered in addition to subsequent incoming mail into a designated location (a dedicated label for Gmail, folder for Outlook). The platform's combination of threat research, organizational context, and machine learning removes the unwanted emails received since the beginning of the attack, leaving legitimate and trusted messages intact.

From the user’s perspective, when their account is opted in the protection, they may see the initial flood of notifications of emails hitting their inbox, but within a matter of seconds, they’ll see the notifications stop and they’ll see the attack emails disappear from their inbox, along with a new label or folder automatically created within their mailbox containing the flood. Material also enables the security team to configure automated emails to be sent to users at the start and end of the attack, notifying them that we’ve detected the surge.

It’s worth noting two things here: first, these emails are filtered into a separate folder/label to free up the inbox and mitigate the disruption caused by the attack. By default, detected messages aren’t deleted or destroyed–allowing users to retrieve legitimate emails from outside the organization and not from trusted entities that may have coincided with the attack. 

As with all of Material’s detections and remediations, this protection has very flexible and granular settings, including the ability for automated remediation to be disabled altogether. When combined with other remediation actions available, the attack response can be tailored to fit your security needs.

Conclusion

Email bombs aren’t new, but that doesn’t make them any less of a problem. Today’s email security market largely relies on little more than blocking inbound threats on a per-email basis–an approach that overlooks a huge chunk of the risks facing modern cloud workspace environments.

Material’s unique approach to email and cloud workspace security allows us to detect and remediate email bombs in seconds–with no effort on the part of the user or the security team–without deleting or losing legitimate emails caught up in the attack. 

If you’d like to see it in action, contact us for a demo today.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

Nate Abbott
5
m read
Read post
Podcast

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m listen
Listen to episode
Video

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m watch
Watch video
Downloads

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m listen
Watch video
Webinar

Defusing Email Bomb Attacks with Material Security

Material delivers a new solution to a resurgent threat: automated remediations to email flooding attacks.

5
m listen
Listen episode
blog post

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

Josh Donelson
3
m read
Read post
Podcast

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m listen
Listen to episode
Video

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m watch
Watch video
Downloads

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m listen
Watch video
Webinar

Securing Google Drive for the Enterprise AI Search Wave

Google Drive isn’t just another input to AI-driven search: for businesses that have standardized on Google Workspace, it’s the most critical.

3
m listen
Listen episode
blog post

Supercharging Gemini Labelling in Google Drive with Material Security

Find sensitive content across your environment and kick off smart, flexible actions like labeling automatically at scale.

Josh Donelson
6
m read
Read post
Podcast

Supercharging Gemini Labelling in Google Drive with Material Security

Find sensitive content across your environment and kick off smart, flexible actions like labeling automatically at scale.

6
m listen
Listen to episode
Video

Supercharging Gemini Labelling in Google Drive with Material Security

Find sensitive content across your environment and kick off smart, flexible actions like labeling automatically at scale.

6
m watch
Watch video
Downloads

Supercharging Gemini Labelling in Google Drive with Material Security

Find sensitive content across your environment and kick off smart, flexible actions like labeling automatically at scale.

6
m listen
Watch video
Webinar

Supercharging Gemini Labelling in Google Drive with Material Security

Find sensitive content across your environment and kick off smart, flexible actions like labeling automatically at scale.

6
m listen
Listen episode
blog post

Classifying Chaos: How Material Automates User-Reported Phishing at Scale

While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.

Eddie Conk
10
m read
Read post
Podcast

Classifying Chaos: How Material Automates User-Reported Phishing at Scale

While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.

10
m listen
Listen to episode
Video

Classifying Chaos: How Material Automates User-Reported Phishing at Scale

While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.

10
m watch
Watch video
Downloads

Classifying Chaos: How Material Automates User-Reported Phishing at Scale

While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.

10
m listen
Watch video
Webinar

Classifying Chaos: How Material Automates User-Reported Phishing at Scale

While automated detection systems catch many threats, user reports remain a vital defense layer – often catching sophisticated attacks that slip through automated filters. See how Material solves this problem.

10
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.