Over the last few months, the topic of email bombing has been brought to our attention multiple times, mostly queries from customers that go something like this:
“I have a few users experiencing some sort of spam attack, where they are receiving thousands of random registration or subscription emails. What do I do, and why is it occurring? Help!”
This scenario is known as email or subscription bombing. Attackers, using various tools and services, subject the victim to a tsunami of emails, usually as a cover for other fraudulent activities. This email flood consists of thousands of legitimate registration or subscription notifications from different websites across the globe, in many different languages.
The attackers use automated tools that target websites that do not require any sort of authentication to subscribe. Input the victim email address, and hey, presto, instant unwanted email. Do this across a few thousand different websites and you have an email bomb.
Figure 1. An example of an unwanted registration email used in an email bomb. Victims will receive thousands of different types of confirmation emails in multiple different languages.
Figure 2: Email bombing attack showing a wide range of notifications.
Attackers use email bombing tools and services that are freely and cheaply available in underground forums. Figure 2 shows an example of a recently advertised tool called “DiddyBomber,” which costs $8 per day or $30 per month.
Figure 3. An email Bombing tool advertisement on an underground forum.
DiddyBomber is an easily used Telegram-based bot tool that requires only a few simple commands.
Figure 4. DiddyBomber Telegram usage commands.
Email bombing is not new, but given the recent increased reports we have received, the practice seems to be on the rise. So why do threat actors use email bombs? Well, there are multiple reasons, but there are two key reasons that we will explore here.
The first and more established reason for email bombing is to act as a smokescreen for fraudulent activity. Attackers bombard you with emails to hide something, usually a real notification email about a transaction they don’t want you to see.
A common scenario helps attackers receive fraudulently purchased goods from a retailer. Basically, attackers obtain stolen account and credit card details, use them to order an item, and then have it shipped somewhere else. They then email bomb the victim so that the real confirmation email is hidden amongst all the noise. The real email is highly likely to be overlooked or deleted by the victim struggling to regain control of their inbox.
The types of fraudulent activity mentioned above that are often linked with email bombs vary. Here are some themes we have seen reported:
The second, and a potentially more damaging one for organizations, is as a pretext for a forthcoming scam phone call. We have seen this attack scenario increase over the past year.
The attacker will employ an email bomb against the victim and then follow up with a phone call or Microsoft Teams call pretending to be someone from IT Helpdesk offering to solve the spam problem. The “solution” involves the installation of remote desktop assistance software like AnyDesk or QuickAssist, which gives the attacker control of the system and can lead to further malicious software installation.
This attack variant is a more recent phenomenon that can lead to serious infiltration. Rapid7 reported the Black Basta ransomware gang employed email bombing as a component of a larger social engineering campaign. In this situation, Black Basta targeted multiple users in an organization with the email bomb and subsequent follow-up call as a method of gaining a foothold in the organization for larger attacks, such as data theft or ransomware.
The first thing is to realize the email bomb is a smokescreen for something else. While annoying to deal with, the email bomb itself is not the primary concern. The flood of emails usually number in the thousands but will eventually dissipate. It may last a day, a week, or happen sporadically for a few weeks. Here are some points to consider: