Abuse Mailbox

Combat Targeted Email Threats with Powerful Abuse Mailbox Automation

Chances are, there are many tedious tasks that slows down your Incident Response processed against threat actors. According to the FBI Internet Crime Report, Email threats are continuously evolving and representing the largest financial losses. Due to the evolving nature of email threats, many organizations today not only put a special flag marking all incoming external emails but also ask users to report any message that has somehow gone undetected. 

In large organizations the number of potentially harmful emails reported to the abuse mailbox might reach thousands daily. Manual processing of such messages, can take up to an hour per single email. This in turn leads to long queues in processing reported emails, slow resolution and frustrated users. IR Mailbox from VMRay Analyzer help you get reliable results of analysis within minutes!

Fully automate suspicious email analysis reported by employees

24/7 always-on email protection

Let VMRay lighten the load for incident response and remediation processes through using the power of automation. For a seamless experience, IR Mailbox from VMRay can easily be integrated with your existing SOC workflow and technology stack such as SIEM, SOAR, Office 365 or ticketing solutions. Unparalleled detonation capabilities of VMRay ensures no unknown threat would go unnoticed. We left no stone unturned through studying every piece of content from the message, following every link it contains and analyzing every website it opens.

advanced malware detection

file analysis

Quick analysis and detection

VMRay Analyzer allows you to safely validate all suspicious emails so that results come in minutes at no human effort. When the analysis is performed, user can be informed automatically about the result. With VMRay IR Mailbox, you can avoid creating another complex long-running process to analyze suspicious emails and focus on what matters most. It enables you to save your time for only unknown malware threats and disruptive phishing campaigns requiring high level of attention.

Turn your users into your allies

Users today are #1 target of attackers and most cyber attacks start with email. As part of company-wide training programs for phishing awareness, employees are encouraged to report suspicious emails to the security teams. VMRay allows you to facilitate an easy to use self-service submission experience with minimal response time that drastically reduce the number of false positive submissions over time. Abuse Mailbox automation will eliminate manual email forwarding, incoming calls to SOC, user frustration and risky clicks on the graymail due the long waiting time.

Advanced Threat Detection (ATD) with VMRay Analyzer

Leverage Rich Feature Set to Mitigate Email Threats at Speed

Model Engineering at VMRay

Flexible deployment
On-premise or Cloud

Microsoft Outlook Plugin

threat Intelligence

threat analysis

malware engineering

Easy and quick configuration

Auto-informing users


Further integration with SOAR 

What our customers say

“Manual analysis of a huge number of submissions was time-consuming. With VMRay, we are able to handle this task with ease in an automated way.
This creates enormous value for our company, customers and partners.”

Cyber Security Team Lead
A Leading Global Tech Company

How VMRay uncovers the unknown email threats

Explore the enabling technologies that make it possible to detect the undetectable

Smart Link Detonation

Attributes-based rules that determine if links embedded in emails and documents should be detonated using VMRay Web Analysis (e.g., domain age, reputation score, abnormal URL string).

alert Triage

Computer Vision

An important part of our detection & analysis technologies that brings the ability to extract text from images using Optical Character Recognition (OCR) in order to detect social engineering techniques used in phishing campaigns.

Adaptive Browser Simulation triggers clicks on links and buttons to detect phishing attacks delivered  via web pages.

Adaptive Browser Simulation

Certain phishing attacks delivered via web pages may only be triggered if the user clicks on a button (e.g., the download button in file sharing sites such as Dropbox).

This feature detects and clicks on these buttons to automatically trigger the payload delivery.

Explore more resources

Suspicious email detection with VMRay from any IR Mailbox
Malware Analysis Spotlight: Kuzuluy Phishing Kit
Gartner Report on Email Security in 2021

How to Detect Malicious Emails with IR Mailbox

Malware Analysis Spotlight: Kuzuluy Phishing Kit

Webcast: How to close the gaps in Office 365