arrows and shield

Cybersecurity stop of the month: the inbox avalanche—how subscription bombing hides the real attack 

Share with your network!

The Cybersecurity Stop of the Month blog series explores the ever-evolving tactics of today’s cybercriminals and how Proofpoint helps organizations better fortify their defenses to protect people against today’s emerging threats.   

Imagine checking your inbox during the day and finding 1,500 new emails waiting for you. They aren't typical spam or malicious phishing links. They are legitimate "welcome to our newsletter" confirmations from real companies, like a bakery in France, a tech blog based in Japan, and a furniture store in the U.S. 

You haven’t become popular overnight. You are the victim of an email subscription bombing attack. And while you are frantically deleting thousands of junk emails to clear your inbox, you miss the single, critical notification that’s buried in the noise: a “password changed” alert or a “wire transfer initiated” notification from your bank. 

This isn't just nuisance spam. It’s a calculated, updated version of a denial-of-service (DoS) tactic that is rapidly gaining in popularity as a sophisticated attack vector.  

What is subscription bombing?  

Subscription bombing attacks occur in short, high-velocity bursts of thousands of emails. A bombing attack delivers over 1,500 emails per hour, designed to overwhelm the victim and render an inbox completely unusable within minutes. While they’re disguised as a productivity disrupting scenario, the real goal is to distract the victim from other types of malicious activity.  

This activity may include hiding account take over scenarios, like resetting a password and locking a user out of their account. Or they may try to move the conversation out of email into a different communication channel, such as Teams or Slack.  

The scenario: the morning "avalanche" 

Here are two real-world examples. 

Healthcare Sector Alert (HC3) 

The Health Sector Cybersecurity Coordination Center (HC3) issued a specific sector alert warning that email bombing is being used to target healthcare and public health organizations. The alert highlights how these attacks can degrade network performance and potentially lead to direct business downtime, urging organizations to implement robust verification systems. 

Black Basta’s "Social Engineering" Smokescreen 

Research from Hornetsecurity has revealed that the notorious Black Basta ransomware group is actively weaponizing subscription bombing. In their campaigns, they flood a user's inbox to create panic and confusion. While the user is distracted, the threat actors contact them via Microsoft Teams posing as IT support to help “fix the spam issue.” Next, they exploit the user by tricking them into downloading remote access tools like AnyDesk or Quick Assist to compromise the network. 

The threat: a smokescreen for fraud 

Subscription bombing is rarely the end goal of an attack. It’s a distraction technique. Attackers use it to paralyze your ability to communicate and to bury evidence of a compromised account. 

Unlike traditional attacks that rely on malicious payloads (like bad URLs or malware), these attacks weaponize legitimate marketing automation. Threat actors use automated bots to scan the web for unsecured newsletter sign-up forms (those lacking CAPTCHA). They then input the victim's email address into thousands of these forms simultaneously. 

Because the emails come from legitimate domains, such as Mailchimp, HubSpot, and real businesses, they have proper authentication (SPF/DKIM). As a result, they bypass traditional spam filters that rely on reputation scoring. To legacy email security gateways, it simply looks like the user enthusiastically signed up for a lot of newsletters. 

How Proofpoint Nexus stops subscription bombing 

While standard filters fail because the emails are technically safe, our AI-powered detection stack, Proofpoint Nexus®, succeeds by analyzing the intent and velocity of incoming email. 

The Nexus technology uses an ensemble of AI engines that work together to identify and block these attacks in real time, ensuring that legitimate mail continues to flow while the “bomb” is contained. 

Here is how the different Nexus engines work together to identify and block an email bombing attack: 

  • Nexus LM™ (Language Model). This engine analyzes language patterns in messages. It specifically looks for high concentrations of ‘welcome to’ or ‘subscription sign-up’ language and identification markers, which are common in automated confirmations. 
  • Nexus RG™ (Relationship Graph). By understanding the baseline behavior of your users, the Nexus RG engine determines anomalies in message volume and velocity. It instantly recognizes that a sudden influx of 500 emails in seconds from previously unknown senders is a deviation from the user's normal activity. 
  • Nexus ML™ (Machine Learning). When these signals converge, the Nexus ML engine activates “Bomb Shelter” mode. This automatically classifies the flood of emails as bulk/low priority and redirects them out of the user’s inbox. This ensures the attack is neutralized. User inboxes are kept clear for the critical alerts that the attacker is trying to hide. And user productivity isn’t disrupted. 

Emerging trends: the bombing spreads 

Subscription bombing is part of a broader trend of high-volume distraction attacks that are on the rise. We are observing threat actors evolving these tactics to other channels: 

  • Form bombing. Similar to subscription bombing, these attacks target transactional forms (like “contact us” or “quote request” pages). Victims receive thousands of “thanks for contacting us” auto-responses. Attacks are often harder to block because they are transactional emails that do not require a “click to confirm” step. 
  • SMS bombing. Also known as multifactor authentication (MFA) fatigue, in these attacks bad actors flood a user’s mobile device with 2FA codes or text messages. This is often used to annoy victims into accepting a fraudulent login request just to make the notifications stop or to mask a SIM swap attack

Defending against the noise 

In an era where attackers weaponize legitimate traffic to hide their crimes, organizations need a defense that understands behavior, not just bad reputations. 

Proofpoint Nexus ensures that no matter how much noise an attacker generates, the signal—and your security—remains clear. By activating defenses like “bomb shelter” mode, we turn a potentially paralyzing DoS attack into a non-event, protecting your people and preserving your business operations. 

To learn more about how we can help your organization protect your people and your data from the next generation of AI-driven threats, schedule a demo today.  

Contact us to learn more about how Prime Threat Protection can help defend against subscription bombing and other emerging cybersecurity risks.  

Read our Cybersecurity Stop of the Month series     

To learn more about how Proofpoint stops advanced attacks, check out our other blogs in this series: