Deciphering Identity Threats: New Tools to Track, Search, and Classify Account Takeovers
Abnormal expands Email Account Takeover Protection with centralized visibility into organizational trends, suspicious user activity, and attacker access paths.
February 9, 2026

Account takeover remains one of the most common and costly identity threats organizations face. Detection capabilities have advanced significantly, but cloud-first, SaaS-driven environments and the increasing use of AI have expanded the volume and complexity of identity-related signals, including authentication events, session behavior, IP context, and email activity.
Security teams now process thousands of identity and email-related alerts each week, yet 59% of security leaders feel they have too many alerts, causing prioritization challenges. At the same time, over 80% of breaches involve compromised credentials or identity misuse.
Detection quality remains essential, but as identity-related signals increase, security teams are also faced with a growing challenge of interpretation. Identity anomalies, email behavior, session events, and SaaS activity often surface in different places and at different levels of abstraction. Turning those signals into a coherent understanding of how suspicious activity leads to an account takeover requires connecting information across dashboards, logs, and case views.
Making Sense of Behavioral Signals Behind Account Takeover
Abnormal detects account takeover by monitoring identity, email, and SaaS activity, flagging anomalous behavior, and correlating those signals into confirmed cases. Abnormal now makes this progression visible within the Email Account Takeover Protection (ATO) workflow, allowing teams to see activity as it moves from monitoring anomalies to detecting account takeovers.
Teams can review organizational trends, look up suspicious activity for specific users, and understand how attackers gain access, all without correlating information across separate views.
These capabilities are delivered through three new additions to ATO:
Account Takeover Dashboard: An organizational view of ATO activity showing trends, signal volume, and attack patterns.
Attack Vector Classifications: Clear labels indicating the initial access method used in an attack.
Anomaly Log: A searchable log of suspicious identity and email activity evaluated as part of ATO detection.
"The Account Takeover Dashboard helps us when reporting to our board in addition to gaining visibility into overall trends on a quarterly basis. Attack Vector Classifications help us gain insight into the 'how' an account compromise happens, which will be invaluable for my team."
— Darrell Montiero, Director, IT & Security, Upstack
Account Takeover Dashboard

The Account Takeover Dashboard provides a dedicated, organizational-level view of ATO activity. It brings together signal volume, suspicious behavior patterns, confirmed cases, and attack categories, allowing teams to understand how account takeover activity is trending across the environment.
This view supports strategic oversight by summarizing ATO activity without requiring deep navigation into individual cases. It helps teams contextualize activity levels, identify emerging attack patterns, and communicate ATO trends effectively to leadership.
Attack Vector Classifications

Understanding how an account was compromised is critical for informing remediation, closing security gaps, and reducing the future attack surface.
Attack Vector Classifications add structured context to ATO cases by identifying the initial access method used in an attack, such as credential stuffing, password spraying, phishing, MFA bombing, or session theft. These classifications are surfaced directly within individual cases and aggregated within the Account Takeover Dashboard.
By combining case-level detail with aggregated views, teams can recognize patterns across incidents, identify the most common access paths in their environment, and prioritize defensive actions based on real attack trends rather than isolated events.
Anomaly Log
As Abnormal continues to expand and evaluate a broad range of identity, email, and SaaS signals to detect account takeover, security teams often want greater transparency into the activity that informs those detections. The Anomaly Log provides a centralized view of suspicious events evaluated as part of ATO detection by surfacing identity-related activity, email behavior, and SaaS signals.

An End-to-End Perspective on ATO Activity
Together, these capabilities provide a complete view of account takeover activity, from organizational-level insight to the detailed signals and attack paths behind individual cases.
Executives gain visibility into trends and patterns without wading through raw data. Analysts gain access to the activity and classifications that inform detections. Security teams gain a clearer way to explain how suspicious behavior evolves into confirmed account takeover.
These updates extend the ATO experience by making investigation more transparent and contextual, supporting both strategic oversight and operational analysis within a single workflow.
We look forward to seeing you at our Abnormal Activity webinar on March 4, 2026, where we will discuss these features and additional updates from Abnormal AI.
Related Posts
Get the Latest Email Security Insights
Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.


