WAVERLY SECURE: Understanding Email Bombing

Written by Waverly IT Team on March 18, 2025

Email Bombing is a malicious activity aimed at disrupting email systems and servers. It involves sending large volumes of emails to overwhelm a specific target system, consuming resources like bandwidth, disk space, and processing power, potentially leading to system slowdowns or failure. Attackers may use multiple email accounts to amplify the effect, causing denial-of-service (DoS) scenarios.

Detection can be indicated by slow email performance or undelivered messages, often from a particular address. To respond, individuals or organizations should identify the source, block incoming packets from the attacker, and alert relevant parties.

Stay Vigilant.

High-net-worth individuals (HNWIs) can take several proactive steps to protect against email bombing, which can target personal or business email systems. Here are some key strategies:

1. Use of Strong Email Security Software

Invest in advanced email security solutions that include spam filters, malware detection, and anti-phishing tools. These tools can help detect and block suspicious emails, including large-scale email bombardments, before they reach your inbox.

2. Implement Email Quotas and Limits

Set per-user email storage quotas and limits on the number of emails that can be received per minute or hour. This can help limit the impact of a bombing attack by preventing the email system from becoming overwhelmed by excessive volumes.

3. Multi-Layered Authentication

Enable multi-factor authentication (MFA) for accessing your email accounts. This adds an extra layer of protection, making it harder for attackers to exploit your system.

4. Dedicated Email Accounts

Consider using separate email accounts for different purposes—one for personal communications, one for business, and one for online sign-ups. This can help compartmentalize the risk and reduce exposure to malicious attacks.

5. Utilize Cloud-Based Email Systems with Built-In Protection

Cloud-based email services like Google Workspace or Microsoft 365 often have advanced security mechanisms in place, such as email filtering, intrusion detection, and automated blocking of suspicious activities, including email bombing.

6. Configure Email Server Security

If you manage your own email server, configure it to block or rate-limit incoming traffic from suspicious sources. Set up blacklists or whitelists to restrict unwanted or untrusted email senders. You may also use Domain-based Message Authentication, Reporting & Conformance (DMARC) and Sender Policy Framework (SPF) to authenticate incoming emails and prevent spoofing.

7. Monitor for Unusual Activity

Use email monitoring tools to watch for unusual patterns in email traffic. Alerts for sudden spikes in incoming emails can help identify potential email bombing attacks early.

8. Educate and Train Staff or Family Members

If HNWIs have personal or professional staff handling emails, they should be trained to recognize signs of email bombing, such as delayed or undelivered messages, and how to report suspicious activity.

9. Backup Systems

Maintain email backups and system redundancies to ensure that if an attack occurs, you can restore operations quickly without data loss. Having a robust disaster recovery plan is crucial.

10. Legal and Technical Support

In the event of a severe email bombing attack, having access to technical support from email service providers and potentially consulting legal experts for advice on dealing with cyber threats can help mitigate the situation.

By combining these practices, HNWIs can significantly reduce the risk of email bombing and safeguard their personal and professional communications.

Back to Resources
Top