Table of contents
Start for free
Andrew Milich / 1.14.2023Home / Email Security
Types of email attacks—protection, detection, and prompt response
Get to know various types of email attacks and learn how to respond to them. We will present the latest security measures to keep your inbox safe and private.According to recent statistics, cybercrime has increased by 600% since the pandemic, largely as a consequence of the increase in remote work and online correspondence. The types of email attacks have also diversified, with more and more users facing data breaches and intrusions of privacy.This guide will present common cyber threats and help you reevaluate your current email security standards. We will discuss:
- The likelihood of email attacks and their types
- End-to-end encryption as an email security measure
- The role of email service providers (ESPs) in your data protection
Safeguard your communications with SkiffSkiff Email provides powerful end-to-end encryption and real-time threat detection
Sign up
Why are cyber attacks by email common?
Emails often contain a history of crucial personal or sensitive data you’ve shared. They’re not only a repository of your private conversations or document attachments, but your email account also holds info about the online services you use, your shopping habits, and your overall digital footprint.Getting attacked via email is common because the process is pretty easy. An average hacker can infiltrate your account using various entry points, such as the login window or the network server. Our list of email attack types covers all major threats across different access points.Common email attack types every user should know
In most cases, cyber-attackers want sensitive data or access to your online accounts. They can steal your identity or sell your credentials to the highest bidder on the dark web. Some hackers also use emails to enter an organization’s servers, disrupt services, and cause reputational damage.On a macro level, email attacks typically fit one or more of these five types:- Phishing
- Malware
- Man-in-the-middle attack
- Denial of service
- Account takeover
Phishing—an ever-expanding evil
Phishing is an umbrella term for any malicious activity involving social engineering and the abuse of predictable human behavior.The attackers use psychological manipulation to harvest data or defraud users.Most of us can see right through the notorious Nigerian prince or trust fund scams by now, but you still need to keep your guard up because phishing attacks are constantly evolving. The table below summarizes the most elaborate phishing tactics:Phishing subtype | Details |
Clone phishing | The hacker intercepts an existing email and sends it to you again, often word for word, using a spoofed address. The new email contains infected attachments or unreasonable requests that can get the unsuspecting user in trouble |
Spear phishing | Spear phishing targets specific individuals within a company to orchestrate access to sensitive info. A spear-phishing email is created after thorough research of the intended victims, so they appear to originate from a trusted source |
Whaling/CEO fraud | Whaling involves tricking senior or influential employees, and even celebrities, into taking a desired action |
Pharming and spoofing | The enablers of pharming and spoofing attacks bait users by creating fake websites that look like the original. These portals are often used to collect credit card info |
HTTPS phishing | HTTPS phishing is an extension of pharming. The attacker spikes emails with links to malicious websites that don’t follow hypertext transfer protocol secure (HTTPS) standards. Such URLs are usually shortened or unnatural |
Vishing | Vishing is a phishing attack that uses telephone calls instead of emails to harvest credit card and similar financial data from sensitive users under fake panic-inducing scenarios |
Malware attacks
Malware attacks—including viruses, adware, scareware, and spyware—often accompany phishing schemes. You get an email asking you to download software or a document, but the attachment is infected with malware. Your inbox and device receive programs for activity tracking, keystroke collection, and data capture, compromising your privacy and security and putting your entire system at risk.Man-in-the-middle (MITM) attacks
Emailing should be correspondence between two or more authorized parties, but there are more players facilitating the communication. A man-in-the-middle attack happens on the route used to send a message. The hacker bypasses network security protocols and intercepts emails traveling through servers and clouds.According to SecureOps Cybersecurity Statistics Report, 95% of HTTPS servers are vulnerable to MITM attacks, and in most cases, the users remain unaware of the breach. The only way to protect your inbox from these attacks is to use end-to-end encryption (E2EE). This security protocol converts a message into undecipherable signs before it starts moving through the network. Only the recipient has the key to decrypt the message, so the hacker cannot use it even if they manage to intercept the communication.Skiff is a highly reliable E2EE email service offering a privacy-first, user-friendly email environment with extra protection against phishing, MITM, and other attacks.Denial of service (DoS) attacks
Denial of service (DoS) attacks plague businesses more than individuals. The hacker uses superfluous traffic to overwhelm and eventually cripple email servers, causing service disruption and significant financial and reputational loss. Signs of a DoS attack include:- The exponential rise in inbound emails from limited sources
- Server slowdowns
- Frequent network disconnection
Account takeover (ATO) attacks
In the case of an account takeover, someone gets hold of your login credentials and takes control of your email account. Your credentials are usually stolen via phishing, malware attack, or device theft. Other tactics can be:- Brute force attack—A brute force attack is implemented by well-configured bots that use trillions of password-username combos to access your email. Complex passwords can delay the process indefinitely
- Dictionary attack—Dictionary attacks work like brute force attacks but target people who use weak passwords, including dictionary words like godfriendedme, password1, qwerty12345, ilovemydog, etc.
- Credential stuffing—If you use similar passwords across platforms, credential stuffing can put you at risk. Hackers gain access to your leaked user data from other websites, using it to take over your email account
Email-based cyber attacks—defense strategy
Your email account is an easy gateway to your online presence, so keeping it secure is essential. Follow the basics of safety as a user—avoid engaging with emails or senders you don't know and never download or open attachments from unfamiliar sources. As for the technical aspects, here are some core security measures:- Improve your password and device security—Using strong passwords and device lock mechanisms can ward off account takeover attacks. A password manager can also help maintain password hygiene
- Enable two-factor authentication (2FA)—2FA requires the user to verify their identity in two ways, which means knowing a password isn’t enough. You also have to do one of the following:
- Enter an OTP sent to a phone
- Provide biometrics validation
- Use an end-to-end encrypted (E2EE) service—Unless you use providers with effective and transparent end-to-end encryption protocols in place, like Skiff Mail, you can never be sure who has access to your data behind the scenes
How E2EE defends you against email attacks
Your data is the most vulnerable on the network. According to the Breach Level Index (BLI) from 2017, more than 99% of 1.9 billion records breached during the first half of the year were unencrypted. E2EE services ensure your data is locked on the network and device levels because they make it unreadable to unauthorized parties.Keep in mind that services like Outlook and Gmail use encryption, but it is not end-to-end encryption. They follow Transport Layer Security (TLS) protocols that encrypt data only during transit, not while it rests on servers. The decryption key is also controlled by the provider, so your data can be hacked by anyone who infiltrates the servers or insiders with access to sensitive data.E2EE allows users to control the decryption keys, which turns the network into a safe passageway for your messages.Opt for a fully secured email serviceSkiff's end-to-end encryption gives you the ultimate email protection
Sign up
Make E2EE email security the norm with Skiff Mail
End-to-end encryption requires complex algorithms, and providers didn’t have the resources to implement it on a large scale for years. The available E2EE services were expensive, complicated, and lacked features vital for effortless online communication.Skiff has revolutionized the landscape with a complete E2EE product suite, containing:Skiff follows a zero-trust policy, so not even Skiff can scan, read, or store your data. Sign up for a Skiff account to discover a secure, end-to-end-encrypted environment. The platform’s intuitive user interface helps you maintain a neat and organized inbox with free access to all essential features, including email search and cloud storage.Skiff’s email attack resistance
Skiff is an open-source service, and the public can check how its security features are implemented. Besides the transparency, Skiff offers enhanced resistance against advanced attacks like:- Phishing and malware
- Impersonation and identity theft
- MITM attacks
- Account takeover attacks
- Username enumeration
- De-anonymization
- Brute force and dictionary attacks
Feature | Description |
2FA | Skiff allows (and encourages) users to use 2FA for a completely secure login process |
Zero-knowledge login | Skiff is all about anonymity. The platform doesn’t require your name, phone number, organization, and other personal info for login. Clients only provide their usernames and passwords upon sign-up, and user passwords are never sent via any network connection |
Subject encryption | Even the priciest E2EE service may fail to encrypt your email subjects. Skiff keeps subjects private, as well as metadata for all Pages and Drive files |
Secure crypto integration | Cryptocurrency users are high-priority targets for cybercriminals. Skiff facilitates seamless crypto wallet integrations to help users enjoy E2EE based on an anonymous crypto identity |
Distributed storage | Skiff offers secure, centralized storage, but if you want greater data portability, Skiff integrates with IPFS (InterPlanetary File System) network providing peer-to-peer (p2p) storage |
The best part about Skiff is that you get E2EE protection across the collaboration platform. Whether you’re creating wikis on Skiff Pages or adding event details on Skiff Calendar, your data is safe.
You can access Skiff from any browser (on PC or smartphone) or install a compatible app (for iOS, Android, and macOS)—all you have to do is create an account. Here’s how:
- Go to the Skiff signup page
- Decide on a username
- Enter the desired password
- Set up an account recovery method (optional)