TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Infosecurity Magazine

Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat

2026-04-13 · Read original ↗

ATT&CK techniques detected

3 predictions
T1564.008Email Hiding Rules
86%
“mailbox rule abuse emerges as stealthy post - compromise threat security researchers have identified a surge in the misuse of mailbox rules within microsoft 365 environments, with attackers increasingly relying on native email features to maintain access, exfiltrate data and mani…”
T1564.008Email Hiding Rules
76%
“access even after password changes in practice, these tactics enable attackers to impersonate victims, hijack communication threads and influence business transactions without triggering traditional security alerts. real - world impact and persistence risks several scenarios illu…”
T1114.003Email Forwarding Rule
42%
“mailbox rule abuse emerges as stealthy post - compromise threat security researchers have identified a surge in the misuse of mailbox rules within microsoft 365 environments, with attackers increasingly relying on native email features to maintain access, exfiltrate data and mani…”

Summary

Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn