From chaos to control: Insights from 24 email bombing waves
Timeline of events The first attack in our dataset occurred on October 9, 2024, with the victim receiving only 95 emails spread over one hour — a...
Email bombing, sometimes called "list linking" or "email cluster bombing," is a cyberattack that floods an inbox with thousands of emails, making it difficult for the victim to manage their messages. While this technique isn’t new, automation has made it cheaper, allowing attackers to misuse legitimate services at scale to overwhelm inboxes. This abuse of legitimate services makes email bombing hard to detect and even harder to block.
Email bombing involves overwhelming a target’s inbox with an excessive number of email messages in a very short time. The emails often fall into two categories:
Legitimate newsletters: Attackers use automated tools to subscribe the victim to numerous newsletters or mailing lists. This results in an excessive amount of subscription confirmations or actual newsletters flooding the inbox. Because these emails come from legitimate services, they are difficult to distinguish from regular messages.
Mass email spamming: In another variant, attackers use compromised email servers to send thousands (or even millions) of spam emails directly to the target’s inbox. Depending on the type of (spam) content, this variant may be easier to distinguish from regular messages.
Email bombing is more than just an inconvenience—it’s often a smoke screen for other malicious activities. By burying important emails under a flood of messages, attackers can hide security alerts or transaction notifications. Criminals use this tactic to:
Email bombing not only disrupts operations but also increases the risk of security breaches, including phishing attacks and ransomware.
To protect against email bombing attacks, security teams can create specialized email filters to identify and block auto-generated emails.
Website administrators and CMS providers can limit registrations or requests from the same IP address.
Mitigations available for xorlab customers: To reduce the impact of email bombing attacks, xorlab introduced the Email Bombing Recipient Addresses List in Release 7.0.9. You can add targeted email addresses to this list for aggressive filtering of auto-generated emails.
To protect your organization and users from email bombing:
Our team will continue to provide guidance on to those affected by email bombing attacks and share detection techniques as they become available.
xorlab lets security analysts see email threats before they land in the inbox. Using data from their organizational context, analysts can quickly create, test, and deploy dynamic security policies that catch tomorrow’s attacks. Take the interactive tour below to learn more.
Curious about how well your organization is protected against modern email attacks? Find out with xorlab's attack simulation and identify weaknesses quickly and easily.
Title image created with DALL·E.
Timeline of events The first attack in our dataset occurred on October 9, 2024, with the victim receiving only 95 emails spread over one hour — a...