WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – When Secure Email Gateways Miss Malware
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – When Secure Email Gateways Miss Malware

Author: Chase Snow

Created: Thursday, July 25, 2024 - 18:17

Categories: Cybersecurity, Security Preparedness

Technology plays an essential role in the security of any organization. While it’s important to utilize, and often rely on, security tools to keep our data and organizations safe, it’s important to remember that these same tools are not foolproof. As of late, threat actors have been observed using various tactics (some new) to bypass Secure Email Gateways (SEGs). As Jennifer Lyn Walker, WaterISAC’s Director of Infrastructure Cyber Defense said, “when technology fails to stop threats, we need to be able to recognize the threats that make it into our inboxes.”

See WaterISAC’s previous coverage of email security and SEG bypass.

Overview of recent observations

Threat actors have been recently observed exploiting the way SEGs analyze the contents of archive file attachments. They employed a .zip archive, which the SEG incorrectly identified as containing a harmless .Mpeg video file, allowing it to bypass blocking or filtering measures. When users opened the archive in Outlook or Windows Explorer, it was revealed as an .html file, leading victims to execute the embedded malware.

What to do about it

Awareness of the threat is most crucial. Having sophisticated security tools does not guarantee that every email that falls into employee inboxes is safe. Members are encouraged to incorporate the attack method described above into security awareness training to help keep users aware of these types of threats.  

For more information on threat actors’ recent methods to bypass SEGs, visit Cofense.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar