Microsoft Defender for Office 365 now blocks email bombing attacks



Microsoft says its Defender for Office 365 cloud-based email security suite will now automatically detect and block email bombing attacks.

Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or Office 365 ATP) protects organizations operating in high-risk industries and dealing with sophisticated threat actors from malicious threats from email messages, links, and collaboration tools.

“We’re introducing a new detection capability in Microsoft Defender for Office 365 to help protect your organization from a growing threat known as email bombing,” Redmond explains in a Microsoft 365 message center update.

“This form of abuse floods mailboxes with high volumes of email to obscure important messages or overwhelm systems. The new ‘Mail Bombing’ detection will automatically identify and block these attacks, helping security teams maintain visibility into real threats.”

The new ‘Mail Bombing’ feature started rolling out in late June 2025 and is expected to reach all organizations by late July. It will be toggled on by default, requires no manual configuration, and will automatically send all messages identified as part of a mail bombing campaign to the Junk folder.

As the company explained over the weekend, Mail Bombing is now available for security operations analysts and administrators as a new detection type in Threat Explorer, the Email entity page, the Email summary panel, and Advanced Hunting.

In mail bombing attacks, threat actors flood their targets’ email inboxes with thousands or tens of thousands of messages within minutes, either by subscribing them to a large number of newsletters or using dedicated cybercrime services that can send a massive number of emails.

In most cases, the attackers’ ultimate goal is to overload email security systems as part of social engineering schemes, paving the way to malware or ransomware attacks that can help exfiltrate sensitive data from victims’ compromised systems.

Email bombing has been employed in attacks by various cybercrime and ransomware groups for over a year. It began with the BlackBasta gang, which used this tactic to fill their victims’ mailboxes with emails within minutes before launching their attacks.

They would follow up with voice phishing cold calls, posing as their IT support teams to trick overwhelmed employees into granting remote access to their devices using AnyDesk or the built-in Windows Quick Assist tool.

After infiltrating their systems, the attackers would deploy various malicious tools and malware implants, enabling them to move laterally through corporate networks before deploying ransomware payloads.

More recently, email bombing has been adopted by a 3AM ransomware affiliate and cybercriminals linked to the FIN7 group, who have also spoofed IT support in social engineering attacks aimed at persuading employees to give up their credentials for remote access to corporate systems.

Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.


Source link


Leave a Reply

Your email address will not be published. Required fields are marked *