Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI

April 15, 2026

New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips

April 15, 2026

Critical Nginx-ui MCP Flaw Actively Exploited in the Wild

April 15, 2026
Facebook X (Twitter) Instagram
Wednesday, April 15
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat
News

Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat

Team-CWDBy Team-CWDApril 13, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers have identified a surge in the misuse of mailbox rules within Microsoft 365 environments, with attackers increasingly relying on native email features to maintain access, exfiltrate data and manipulate communications after account compromise.

The Proofpoint findings, published earlier today, show that about 10% of breached accounts in Q4 2025 had malicious mailbox rules created within seconds of initial access.

These rules often use minimal or nonsensical names and are designed to delete emails or move them into rarely monitored folders like Archive or RSS Subscriptions.

How Attackers Exploit Microsoft 365 Mailbox Rules

Mailbox rules provide attackers with automation and stealth. Once inside an account, they can silently control email flow while avoiding detection. By suppressing or redirecting messages, attackers reshape what victims see in their inbox, allowing fraudulent activity to continue unnoticed.

Common attacker objectives include:

  • Forwarding sensitive emails to external accounts for data theft

  • Hiding security alerts, password resets and suspicious activity

  • Intercepting and manipulating ongoing email conversations

  • Maintaining access even after password changes

In practice, these tactics enable attackers to impersonate victims, hijack communication threads and influence business transactions without triggering traditional security alerts.

Real-World Impact and Persistence Risks

Several scenarios illustrated how mailbox rule abuse plays out. In one case observed by Proofpoint, attackers targeted payroll processes by launching internal phishing emails from a compromised account, while rules were created to hide replies and warnings. This ensured the activity remained largely invisible.

In another example, attackers combined mailbox rules with third-party email services and domain spoofing to intercept vendor communications and insert fraudulent payment requests into existing threads.

Read more on business email compromise (BEC) attacks: Scripted Sparrow Sends Millions of BEC Emails Each Month

University environments have also been affected. Attackers frequently deploy blanket rules that delete or hide all incoming messages, isolating the mailbox and enabling large-scale spam campaigns without user awareness.

One of the most concerning aspects is persistence. Malicious forwarding and suppression rules can remain active even after credentials are reset, allowing continued data exposure.

The researchers also note that automation tools now enable attackers to deploy these rules across multiple accounts at scale, turning a simple feature into a powerful and difficult-to-detect attack method.

To defend against similar threats, Proofpoint suggested that organizations disable external auto-forwarding, enforce strong access controls, including MFA and closely monitor OAuth activity. Ensuring rapid response by removing malicious rules, revoking sessions and auditing account activity is also recommended.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
Next Article BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks
Team-CWD
  • Website

Related Posts

News

OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI

April 15, 2026
News

New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips

April 15, 2026
News

Critical Nginx-ui MCP Flaw Actively Exploited in the Wild

April 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

Top IRS scams to look out for in 2026

February 10, 2026

AI-powered financial scams swamp social media

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.