We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Email Bombing?

Mary McMahon
By
Updated: May 16, 2024

Email bombing is a form of denial of service attack that floods an inbox and mail server with messages. If enough messages are sent, the systems may be overloaded and they will stop working. Many Internet service providers (ISPs) regard email bombing as a violation of the terms of service and they will suspend accounts of people involved in such attacks.

There are several ways to coordinate an email bombing attack. One is to send large numbers of email directly, often using multiple accounts. Spreading the emails out over many accounts will also make it harder to pin down the source of the attack, and it will not tip off ISPs that flag high email volume from a single account. A virus can be written to hijack email accounts held by other people and use them to bomb the target.

Another option is so-called “list bombing,” where the subject is signed up for large numbers of mailing lists. Email bombers can also use tactics like displaying an email address on web pages in a format that is easy to bots to pick up, in the hopes that the target will be deluged in spam. Spam, however, may be filtered and held separately, making list bombing an appealing option because communications from mailing lists are usually sent right to the inbox.

The use of verification emails for mailing lists is designed to prevent abusive signups, but email bombing can involve workarounds. For example, the bomber can create a new email address for the signup, click the link in the confirmation email, and then set up the account to forward to the target. The target will receive the communications from the mailing list and will not be able to unsubscribe because the mailings are not being sent directly through the organization.

This type of attack can be a nuisance on a low level, but it can also become a serious problem. If email bombing is targeted at a professional or work email, someone might not be able to access emails for work. If the server gets overloaded or the inbox is full, legitimate emails sent to the target may be refused, and the target will not be able to send emails out. It can also become a security issue if the email bombing includes emails with embedded viruses, malware, or spyware and the sender accidentally opens these.

There are a variety of techniques that can be used to address email bombing. Maintaining multiple email addresses for different activities can help. Protections on the server can include temporary suspensions of accounts that appear to be targets of email bombs while the situation is addressed.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary McMahon
By Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a EasyTechJunkie researcher and writer. Mary has a liberal arts degree from Goddard College and spends her free time reading, cooking, and exploring the great outdoors.

Discussion Comments
By anon326597 — On Mar 22, 2013

It's not always malicious. I get spammed all the time by the Nigerians. Flooding them with spam is one way of frustrating them and keeping them away from real potential victims.

Mary McMahon
Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a...

Learn more
Share
https://www.easytechjunkie.com/what-is-email-bombing.htm
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.