Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: v20250117a
Table of Contents

2024-1201-3117

Status
colourBlue
titlenew feature
- Burst Detection Generally Available

Burst Detection

...

INKY introduces Burst Detection, a powerful new feature to help administrators detect and respond to sudden surges in email volume targeting specific recipients over a short period. These bursts can be part of a strategy to overwhelm or distract users, often paired with unsolicited tech support calls or other suspicious offers to help “resolve” the issue.

Configuration can be found on: https://app.inkyphishfence.com/settings/analysis

Learn more here: Burst Detection

Info

You can configure Burst Detection at either the team level or the organization level to apply consistent detection parameters across all teams. Any team-level setting will override the organization-level values.

With the new Burst Detection feature, administrators can configure:

  1. Burst Interval (seconds)
    Define a time window — for example, 300 seconds — within which to measure a surge in email volume.

  2. Message Threshold
    Set the minimum number of messages (e.g., 20) needed to trigger detection of a burst in that time interval.

  3. Burst Mode Cache Duration (seconds)
    Keep a recipient in “burst mode” for a set duration after the initial burst detection to ensure continued protection, even if the volume temporarily dips.

  4. Ignore Senders/Recipients for Burst Detection
    Specify email addresses or domains that should never trigger or be flagged as part of a burst (useful for high-volume internal senders or privileged services).

  5. Result Bucket
    Choose the category (e.g., “Caution (Spam)”) that INKY assigns when a message is detected as part of a burst.

  6. Delivery Target
    Override the delivery action (e.g., route to “Junk Folder”) for burst-detected messages.

  7. Exclude Internal or Trusted 3rd Party Messages
    Automatically skip internal or trusted third-party messages from burst calculations.

  8. Exclude Known External Messages
    Similarly, skip known external, trusted contacts from contributing to burst detection.

...

How It Works

When a sudden surge in email volume meets or exceeds the specified “Message Threshold” within the configured “Burst Interval,” the target recipient is immediately considered in “burst mode.” Messages are flagged under the “Suspicious Mail Burst” threat category, and INKY will apply the configured result bucket and delivery target for the duration of the “Burst Mode Cache.”

Use Burst Detection to protect against potential social engineering attacks that rely on message spamming, or to stay alert when a specific user suddenly becomes a high-volume email target.

For more information on setting up or fine-tuning Burst Detection, refer to your INKY documentation or contact your INKY support representative.

Status
titleENHANCEMENT
- New Brand Impersonation Filter

Found within the Dashboard Widget Filter Editor under Analysis → Brand Impersonation is a new capability to filter messages based on the detected brands domain. Selecting a specific brand’s domain or multiple brand domains will retrieve a list of messages that INKY has identified as Brand Impersonation based on the brand selected.

...

Status
titleENHANCEMENT
- Enhanced Email Header Inspection for Improved Security

With this update, hovering over the From and Reply-To email addresses in a message header will display a popup rendering the address in a mono-font and lowercase. This design improvement helps users quickly identify confusable characters and spot potential phishing attack vectors with greater ease.

...

Status
titleENHANCEMENT
- Improved Filter Descriptions

We've added concise, helpful descriptions to some of the less obvious filters in the Filter Editor. For example, the Brand Impersonation Filter now includes guidance on detecting impersonations based on a brand's primary domain. These updates make it easier to understand and configure filters for your security needs.

...

is now generally available for all INKY customers. This powerful feature proactively identifies and flags sudden surges in email volume—often seen in spam bombs and subscription attacks—helping you stay one step ahead of malicious activity. If you need assistance or want to learn more, please review the full documentation here: Burst Detection

Status
titleENHANCEMENT
- Burst Detection Status Control

INKY is pleased to announce the release of new Burst Detection UI Enhancements, providing administrators with greater visibility and control over recipients in burst mode. This update allows admins to quickly see who is currently in burst mode, manually force or extend burst mode for specific recipients, and manage “prevented” recipients.

...

Key Improvements

  • Active Recipients View
    Displays recipients currently in burst mode, the time until it expires, and actions to extend, reset, or prevent burst mode for those recipients.

  • Prevented Recipients View
    Shows recipients who are temporarily exempt from burst detection until a specified time, ensuring no mail to them will be classified under the Suspicious Mail Burst category.

  • Force Recipient Into Burst Mode
    Admins can manually force a user into burst mode and specify its duration, proactively applying the Suspicious Mail Burst classification to incoming mail.

  • Reset Tracking Data
    Clears historical data related to burst detection for the team, allowing you to start from scratch while maintaining your existing burst detection settings.

Benefits

  • Improved Visibility: Quickly identify and manage recipients most affected by burst detection.

  • Proactive Controls: Admins can manually initiate or prevent burst mode as needed.

  • Simplified Workflow: The new UI centralizes key actions in a single pane, making it easier to respond to changing threat conditions.

If you’d like to learn more about configuring and using Burst Detection, visit our Knowledge Base or contact INKY Support.