CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 15, 2026

Hackers Create Hidden Mailbox Rules in Microsoft 365 to Intercept Sensitive Business Emails

Cybersecurity News Archived Apr 15, 2026 ✓ Full text saved

Cybercriminals have found a quiet way to sit inside a corporate email account and read everything being sent and received — without the account owner ever knowing. Attackers are now abusing a built-in Microsoft 365 feature called mailbox rules to silently intercept business emails, redirect financial communications, and suppress security notifications, all while staying completely […] The post Hackers Create Hidden Mailbox Rules in Microsoft 365 to Intercept Sensitive Business Emails appeared fi

Full text archived locally
✦ AI Summary · Claude Sonnet


    Home Cyber Security News Hackers Create Hidden Mailbox Rules in Microsoft 365 to Intercept Sensitive Business... Cybercriminals have found a quiet way to sit inside a corporate email account and read everything being sent and received — without the account owner ever knowing. Attackers are now abusing a built-in Microsoft 365 feature called mailbox rules to silently intercept business emails, redirect financial communications, and suppress security notifications, all while staying completely invisible to the victim. Mailbox rules are a standard productivity feature inside Microsoft 365 and Outlook that help users automatically sort, forward, or delete incoming messages. But when attackers gain unauthorized access to an account, they turn these rules into a persistent surveillance tool. Once active, a malicious rule runs quietly in the background and acts on every incoming email based on conditions the attacker has set — forwarding sensitive messages to external addresses, hiding password reset notifications, or burying security alerts in folders the victim never checks. Proofpoint researchers Anna Akselevich, Pavel Asinovsky, and Yaniv Miron identified this technique as one of the most consistent post-exploitation behaviors observed across cloud-based account takeovers. Their analysis found that approximately 40% of compromised Microsoft 365 accounts had at least one malicious mailbox rule created shortly after the initial breach. The shortest recorded time between an account compromise and rule creation was just eight seconds, clearly showing how deliberate and automated this tactic has become. In Microsoft 365 environments, attackers typically gain their first foothold through credential phishing, password spraying, or OAuth consent abuse. Rather than deploying malware or standing up external infrastructure, they rely on the platform’s native features to maintain access and stay hidden. This makes detection significantly harder because all malicious activity runs entirely inside Microsoft’s own environment, using legitimate built-in functionality rather than any suspicious external tools. The impact stretches well beyond individual accounts. From Business Email Compromise fraud to large-scale spam operations targeting university networks, attackers use hidden mailbox rules to operate undetected inside organizations for weeks or even months. The technique works across all sectors and exploits the simple fact that most users never review their mailbox rule settings. How Hidden Rules Operate Inside Compromised Accounts Once inside a compromised account, attackers follow a repeatable and methodical process. They create mailbox rules using short, generic, or nonsensical names — nothing a real user would set — so the rules stay invisible to casual review.  Rule Creation Example in Microsoft Outlook (Source – Proofpoint) These rules achieve multiple goals at once. They silently forward emails containing financial keywords such as “invoice,” “wire,” or “contract” to attacker-controlled external addresses. They hide MFA alerts, password reset emails, and suspicious login warnings so victims never realize their accounts have been breached. And because these rules survive password resets, they maintain persistent access long after credentials are changed. In one documented payroll fraud scenario, an attacker compromised an account and immediately created a rule to archive any email containing “Payment List” in the subject line. The attacker then used a third-party email platform called Zoho to register a spoofed domain built with homoglyph characters — letters designed to look nearly identical to those in the legitimate company domain. Zoho Verification Code (Source – Proofpoint) Since the mailbox rule was already active, every verification email from Zoho was automatically moved to a hidden folder, letting the attacker complete registration without the victim’s awareness.  From this external account, fraudulent messages were inserted into existing email threads to manipulate payment actions. Security teams and organizations should take several steps to limit exposure. Disabling automatic external forwarding in Exchange Online removes one of the most abused persistence paths. Enforcing multi-factor authentication with conditional access policies reduces the risk of initial account compromise. Monitoring OAuth consent grants for suspicious application permissions, auditing mailbox rules on a regular schedule, revoking active sessions when a breach is detected, and reviewing Entra ID sign-in logs for unusual locations or risky authentication events are all critical actions for detecting and containing rule-based threats early. Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google. RELATED ARTICLESMORE FROM AUTHOR Cyber Security News Agentic LLM Browsers Expose New Attack Surface for Prompt Injection and Data Theft Cyber Security News FUNNULL-Linked Triad Nexus Resurfaces With 175+ Rotating CNAME Domains and Global Scam Portals Cyber Security News Windows BitLocker Vulnerability Allows Attacker to Bypass Security Feature Top 10 Top 10 Best User Access Management Tools in 2026 April 4, 2026 Top 10 Best VPN For Chrome in 2026 April 4, 2026 20 Best Application Performance Monitoring Tools in 2026 April 3, 2026 Top 10 Best VPN For Linux In 2026 April 3, 2026 10 Best VPN For Privacy In 2026 April 2, 2026
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 15, 2026
    Archived
    Apr 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗