Email Attack Timeline

Explore the evolution of email-based attacks and defenses.

2015
1982 2025
Peak

SMTP had no sender validation; any server could claim any envelope sender

Peak

Open relays were the norm; SMTP assumed trusted network

Peak

Concept virus, Melissa, ILOVEYOU; macros enabled by default

Decline

MAPS RBL and other blacklists pressure admins to close relays

Decline

Macro warnings introduced; social engineering required

Peak

Storm Worm, Srizbi, Rustock dominate; billions of spam emails daily

Peak

SPF deployed but header spoofing trivial; users deceived by From header

Decline

SPF adoption grows; major providers start checking records

Open Mail Relay Abuse 2004-Present
Dead

Open relays rare; instantly blacklisted when found

Peak

Reply-To widely abused; no authentication or validation

Peak

SPF adoption grows; lookup limit poorly understood

Peak

SPF adoption inconsistent; many domains misconfigured or missing records

Peak

SPF/DKIM deployed but attackers exploit alignment gaps and lack of policy

Decline

Protected View introduced; macros disabled from internet

Peak

Cutwail, Grum reach massive scale; takedown operations begin

Peak

Credential stuffing attacks provide endless supply of compromised accounts

Display Name Abuse 2010-2015
Peak

Mobile email clients truncate addresses, show only display names

Decline

DKIM adoption grows; major providers sign outbound mail

Peak

DMARC deployed but p=none common; attackers ignore unenforced policies

Decline

DMARC published; major providers implement; enforcement grows

Peak

CEO fraud emerges; wire transfer scams net millions

Decline

DMARC adoption helps; some clients warn on mismatch

Decline

Awareness increases; flattening services emerge

Decline

Best practices spread; major providers enforce SPF

Limited

Major botnets disrupted; spam shifts to compromised accounts and webmail

Peak

DMARC adoption forces attackers to lookalike domains; registrars don't police

Limited

SPF widely deployed but insufficient alone; bypasses exist

Peak

Simple password protection defeats most scanning

Peak

OAuth token theft and MFA bypass techniques emerge

Display Name Abuse 2016-2020
Peak

BEC attacks heavily exploit display name; some clients improve

Peak

Emotet, TrickBot, Dridex dominate; "Enable Content" social engineering

Peak

URL rewriting services emerge; attackers develop counter-techniques

Peak

Explosion of GCS/S3-hosted phishing; filters not inspecting paths

Peak

FBI reports billions in losses; attacks grow more sophisticated

Decline

Major providers enforce DMARC; gaps in subdomain handling discovered

Limited

DKIM widely deployed but requires DMARC for enforcement

Peak

Emotet pioneered automated thread hijacking at scale

Peak

Homograph attacks using Unicode; automated domain generation

Active

DMARC at p=reject is gold standard; attackers pivot to cousin domains

HTML Smuggling 2018-2020
Peak

Technique emerges; used by nation-states (NOBELIUM)

Peak

Widespread adoption as email security improved URL reputation checking

Peak

ISO/IMG mounting exploits MOTW gap; macros still primary delivery

Peak

Technique emerges; highly effective against URL scanning

Peak

Workers abuse emerges; Cloudflare Pages adds to attack surface

Peak

QakBot, Emotet use extensively; detection improves

Active

Still used in targeted attacks; detection improving

Active

Complex cloud environments still exceed limits; void lookups exploited

Active

Cloud complexity creates new misconfiguration opportunities

Peak

Sophisticated timing attacks; weaponization post-delivery common

Limited

Occasional macOS malware campaigns; most phishing still Windows-focused

Decline

Cloud providers add abuse detection; SEGs start path inspection

Peak

COVID-19 normalizes QR codes; attackers begin exploiting

Peak

QakBot, IcedID adopt technique; highly effective for malware delivery

Active

Still

Peak

BazarCall pioneered technique; ransomware groups adopt

Peak

reCAPTCHA, hCaptcha abuse widespread; detection adapts

Active

Primary spam delivery method; botnets largely obsolete for email

Display Name Abuse 2021-Present
Active

Still effective especially on mobile; DMARC doesn't address it

DMARC Alignment Gaps 2021-Present
Active

Subdomain takeover and alignment exploits remain viable

HTML Smuggling 2021-2022
Peak

Widespread adoption post-macro blocks; commodity malware adopts

Active

Continues evolving; platforms implement countermeasures; attackers diversify services

Peak

Mass adoption by phishing kits; detection plays catch-up

Cousin Domain Spoofing 2022-Present
Active

Still highly effective; brand monitoring services emerge

Office Macro Malware 2022-Present
Limited

Microsoft blocks macros from internet by default; attackers pivot

Active

Some SEGs crack common passwords; still effective with unique passwords

Peak

Massive spike in QR phishing; Microsoft/DocuSign lures common

Active

Time-of-click scanning helps; attackers adapt with shorter windows

Peak

Microsoft blocks macros; mass pivot to ISO/IMG/LNK containers

Peak

macOS enterprise adoption increases; MetaStealer, AMOS, and other stealers emerge

Limited

Still works with rapid rotation; detection improving

Active

Widespread use; combines email + vishing; detection difficult

CAPTCHA-Gated Phishing 2023-Present
Active

Multi-stage CAPTCHAs; Cloudflare Turnstile abuse

HTML Smuggling 2023-Present
Active

Detection improving; still effective with obfuscation

Email Thread Hijacking 2023-Present
Active

Remains primary delivery method for banking trojans and ransomware

Active

Microsoft patches MOTW for ISOs; attackers pivot to nested containers and new formats

Active

Cloudflare improves detection; attackers also abuse AWS Lambda, Azure Functions

Active

SEGs adding QR detection; attacks evolving to evade

Active

Continued targeting of macOS; Gatekeeper bypasses and social engineering evolve