We analyzed 5,000 phishing attacks that bypassed enterprise SEGs. Not one-trick attacks — a mature evasion ecosystem where attackers engineer multi-technique architectures to defeat the specific stack they're targeting.
Every evasion technique serves one of three roles: it shifts the attack channel, obfuscates the payload, or exploits human psychology. Attackers don't pick one—they stack them.
Only 9.1% of detections use a single technique or none. The average attack stacks 4.11 techniques simultaneously. 56.8% use four or more.
Techniques per detection · Pink bars = 5+ techniques (56.8% of all detections)
The most sophisticated attacks construct a layered architecture where each layer defeats a different detection capability. The combination creates a detection gap that compounds multiplicatively.
Classified by primary evasion strategy, not raw technique count. A TOAD attack with 2 techniques is harder for a SEG to detect than a redirect chain with 6, because the TOAD payload is structurally unblockable.
| Super-Family | % of Total | SEG Detection Difficulty |
|---|---|---|
| TOAD / Phone Callback | 27.8% | Structural blind spot |
| Redirect Chain Families | 27.4% | Hard (evasion-dependent) |
| Legitimate Infrastructure (LOTS) | 16.7% | Hard (reputation-laundered) |
| Social Engineering Pure-Play | 14.0% | Medium-hard (high FP cost) |
| QR Code Attack Families | 6.0% | Structural blind spot |
| Voice Channel Shift | 2.1% | Structural blind spot |
| Content Evasion | 2.0% | Medium |
| Collaboration Platform Spoofing | 0.7% | Hard |
| Authentication Exploitation | 0.5% | Very hard |
Evasion profiles are not random. Microsoft environments face image-based payload attacks; Google Workspace faces notification spoofing and voicemail pivots. Attackers are optimizing for the detection gaps of specific platform architectures.
How 5 real attack campaigns defeat each layer of email security — plus detection gap analysis, EDR limitations, and defense implications.
What's below: 5 campaign walkthroughs · Detection tier analysis · Why EDR doesn't close the gap · DocuSign-SendGrid nexus · Defense implications
Anonymized real detections. Each shows how technique combinations defeat detection at each stage of the email security pipeline.
| Stage | What Happens | Why Detection Fails |
|---|---|---|
| Delivery | Email from webmail with PayPal branding, financial language, and a phone number. | No URL or attachment to scan. PayPal branding appears in millions of legitimate emails. |
| Trust | PayPal logo, color scheme, legal footer. Specific dollar amount and "business account upgrade" framing. | Brand-matching requires visual analysis. The dollar amount feels transactional, not fabricated. |
| Exploitation | Victim calls the number. Call center performs credential harvesting or gift card fraud. | The attack is over the phone — no email security monitors calls. Remediation cannot undo a completed call. |
| Stage | What Happens | Why Detection Fails |
|---|---|---|
| Delivery | HR/payroll-themed email with a PDF attachment. No URL in the email body. | No malicious URL text for regex to match. PDF is a legitimate business document format. |
| Payload | QR code embedded as an image inside the PDF. Encodes a URL to a credential harvesting page. | The URL is encoded in pixels inside an image — requires OCR, computer vision, and QR decoding. |
| Gate | CAPTCHA blocks automated analysis of the decoded URL. | The SEG sandbox hits the CAPTCHA and cannot proceed. URL is marked "clean." |
| Exploitation | Victim scans QR on personal mobile, completes CAPTCHA, enters credentials. | Mobile device is outside enterprise security monitoring. Exploitation occurs on an unmanaged device. |
| Stage | What Happens | Why Detection Fails |
|---|---|---|
| Delivery | Email with embedded URLs through legitimate redirect infrastructure. | First-hop URLs pass reputation checks via trusted redirect endpoints. |
| Evasion | 3+ redirect hops exceed scanner recursion depth. Returns benign page when scanned, malicious at click-time. | SEG scanners follow 1–2 redirects. 3+ hop chains defeat time-of-click rewriting. |
| Exploitation | Credential harvesting page that only activates after the scan window closes. | Safe Links' 48% E3 penetration suggests attackers engineer redirect chains to evade time-of-click rewriting. |
| Stage | What Happens | Why Detection Fails |
|---|---|---|
| Trust | Sender name matches the victim's own company. Subject references account verification — a routine IT workflow. | Completely plausible. The only signal is sender-name vs. sender-domain mismatch. |
| Evasion | Multiple redirect hops through different domains before reaching the harvesting page. | Sender-brand correlation is contextual intelligence most SEGs don't perform. |
| Stage | What Happens | Why Detection Fails |
|---|---|---|
| Trust | Automated system notification format. Order numbers and transaction IDs add bureaucratic credibility. | Recipients are conditioned to trust automated notifications from hundreds of legitimate services. The fake notification format also provides cover for unusual formatting. |
| Evasion | Educational domain (.edu.mx) claiming to be Norton. No brand-matching logic connects them. | Connecting an .edu.mx domain to a Norton billing alert requires sender-brand correlation most SEGs don't perform. |
| Exploitation | Phone callback to the provided number leads to social engineering. | Same TOAD structural blind spot. The attack exits email before any harm occurs. |
EDR products — Microsoft Defender for Endpoint, CrowdStrike Falcon, SentinelOne — detect malicious code execution on managed endpoints. The evasion patterns here are engineered to avoid the endpoint entirely.
The victim calls a phone number. Credential harvesting, remote access installation, gift card fraud — all happen over the phone. EDR sees nothing: no file execution, no process creation, no network indicator of compromise. When the attacker later uses stolen credentials, the authentication happens against cloud services, not on the endpoint.
QR code attacks (up to 53% in Microsoft environments) shift exploitation to personal smartphones. EDR sees the PDF opened — it cannot see the phone scanning the QR code, navigating the CAPTCHA, or entering credentials on an unmanaged device.
DocuSign at 24.8% is now the most impersonated brand. Attackers use the same SendGrid infrastructure as real DocuSign — structurally indistinguishable at the email header level.
| Brand Ecosystem | % of Total |
|---|---|
| DocuSign | 24.8% |
| Microsoft | 11.7% |
| 10.7% | |
| Norton/McAfee/Geek Squad | 10.6% |
| SendGrid | 8.2% |
| PayPal | 5.9% |
| Amazon/AWS | 5.9% |
| Meta/Facebook | 5.4% |
| Shipping (USPS/UPS/FedEx/DHL) | 3.6% |
They went from single techniques to personalized kill chains. We went from context-less alerts to fully reasoned cases with complete kill chain analysis.
This research is based on real enterprise environments. The evasion patterns hitting your organization are specific to your platform, your SEG, and your industry.
Walk your security team through the full findings. We'll present the research, answer questions, and map it to your environment — 30 minutes, no commitment.
Book a Threat Briefing →See what evasion patterns are getting past your current email security. We'll run a proof-of-concept against your live traffic and show you your specific blind spots.
Request a Threat Assessment →Tomorrow's Threats. Stopped Today.