Critical Infrastructure Cybersecurity Framework
T1667Impact1 Mitigations

Email Bombing

Adversaries may flood targeted email addresses with an overwhelming volume of messages to bury legitimate emails and disrupt business operations.

Description

Adversaries may flood targeted email addresses with an overwhelming volume of messages to bury legitimate emails and disrupt business operations.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

User Training

Quick Info

Technique ID
T1667
Tactic
Impact
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.