TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Proofpoint Threat Insight

Microsoft 365 mailbox rules abused for exfiltration, persistence

2026-04-13 · Read original ↗

ATT&CK techniques detected

4 predictions
T1564.008Email Hiding Rules
88%
"microsoft 365 mailbox rules abused for exfiltration, persistence a broad mix of attackers are abusing microsoft 365 mailbox rules as a stealthy method to quietly manage email flow by deleting, hiding, forwarding or marking messages as read without alerting victims. security pros …"
T1564.008Email Hiding Rules
88%
"many types of attackers leverage this technique. it ' s an easy method that uses native functionality with such a high value that just about everyone uses it, noted miron. “ it could be used manually, added to part of a hacking tool, or even incorporated into malware that uses po…"
T1564.008Email Hiding Rules
62%
"##ntial level, they remain even after a password reset. ” denis calderone, cto and principal at suzu labs, explained that mailbox rules are one of the very first issues security teams look for when they are triaging a business email compromise. here ’ s how it works : the attacke…"
T1114.003Email Forwarding Rule
48%
"microsoft 365 mailbox rules abused for exfiltration, persistence a broad mix of attackers are abusing microsoft 365 mailbox rules as a stealthy method to quietly manage email flow by deleting, hiding, forwarding or marking messages as read without alerting victims. security pros …"