Email Attack Timeline
Explore the evolution of email-based attacks and defenses.
SMTP had no sender validation; any server could claim any envelope sender
MAPS RBL and other blacklists pressure admins to close relays
Storm Worm, Srizbi, Rustock dominate; billions of spam emails daily
SPF deployed but header spoofing trivial; users deceived by From header
SPF adoption grows; major providers start checking records
SPF adoption inconsistent; many domains misconfigured or missing records
SPF/DKIM deployed but attackers exploit alignment gaps and lack of policy
Cutwail, Grum reach massive scale; takedown operations begin
Credential stuffing attacks provide endless supply of compromised accounts
DKIM adoption grows; major providers sign outbound mail
DMARC deployed but p=none common; attackers ignore unenforced policies
DMARC published; major providers implement; enforcement grows
Best practices spread; major providers enforce SPF
Major botnets disrupted; spam shifts to compromised accounts and webmail
DMARC adoption forces attackers to lookalike domains; registrars don't police
SPF widely deployed but insufficient alone; bypasses exist
Simple password protection defeats most scanning
Emotet, TrickBot, Dridex dominate; "Enable Content" social engineering
URL rewriting services emerge; attackers develop counter-techniques
Explosion of GCS/S3-hosted phishing; filters not inspecting paths
FBI reports billions in losses; attacks grow more sophisticated
Major providers enforce DMARC; gaps in subdomain handling discovered
DKIM widely deployed but requires DMARC for enforcement
DMARC at p=reject is gold standard; attackers pivot to cousin domains
Widespread adoption as email security improved URL reputation checking
ISO/IMG mounting exploits MOTW gap; macros still primary delivery
Workers abuse emerges; Cloudflare Pages adds to attack surface
QakBot, Emotet use extensively; detection improves
Complex cloud environments still exceed limits; void lookups exploited
Cloud complexity creates new misconfiguration opportunities
Sophisticated timing attacks; weaponization post-delivery common
Occasional macOS malware campaigns; most phishing still Windows-focused
Cloud providers add abuse detection; SEGs start path inspection
QakBot, IcedID adopt technique; highly effective for malware delivery
Primary spam delivery method; botnets largely obsolete for email
Still effective especially on mobile; DMARC doesn't address it
Continues evolving; platforms implement countermeasures; attackers diversify services
Microsoft blocks macros from internet by default; attackers pivot
Some SEGs crack common passwords; still effective with unique passwords
Massive spike in QR phishing; Microsoft/DocuSign lures common
Time-of-click scanning helps; attackers adapt with shorter windows
Microsoft blocks macros; mass pivot to ISO/IMG/LNK containers
macOS enterprise adoption increases; MetaStealer, AMOS, and other stealers emerge
Still works with rapid rotation; detection improving
Widespread use; combines email + vishing; detection difficult
Remains primary delivery method for banking trojans and ransomware
Microsoft patches MOTW for ISOs; attackers pivot to nested containers and new formats
Cloudflare improves detection; attackers also abuse AWS Lambda, Azure Functions
Continued targeting of macOS; Gatekeeper bypasses and social engineering evolve