Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Microsoft 365 Mailbox Rules for Email Interception

Hackers Exploit Microsoft 365 Mailbox Rules for Email Interception

Posted on April 15, 2026 By CWS

In a concerning development, cybercriminals have discovered a stealthy method to infiltrate corporate email accounts, allowing them to monitor all communications without alerting the account owner. This tactic involves exploiting a Microsoft 365 feature known as mailbox rules.

Understanding Mailbox Rules Abuse

Mailbox rules, typically used to streamline email management by sorting, forwarding, or deleting messages, are being repurposed by attackers. By gaining unauthorized access to an account, cybercriminals can manipulate these rules into tools for ongoing surveillance, surreptitiously forwarding sensitive communications to external addresses and concealing security notifications.

According to research from Proofpoint, led by Anna Akselevich, Pavel Asinovsky, and Yaniv Miron, this technique is prevalent in cloud-based account takeovers. Their findings reveal that around 40% of compromised Microsoft 365 accounts had at least one malicious rule installed shortly after the breach, with some being set up in as little as eight seconds.

Technical Insight into the Exploit

Attackers often initiate their breach through tactics like credential phishing, password spraying, or abusing OAuth consent. Instead of deploying malware, they utilize Microsoft 365’s built-in features to maintain access while evading detection. This internal exploitation makes it difficult to identify malicious activity, as it doesn’t involve any external tools.

The ramifications of these hidden rules span various sectors, facilitating anything from Business Email Compromise (BEC) fraud to extensive spam campaigns. These rules exploit the fact that most users rarely inspect their mailbox settings, allowing attackers to operate unnoticed for extended periods.

Operational Techniques and Case Studies

Once inside an account, attackers set up mailbox rules with innocuous or nonsensical names to avoid detection. These rules perform multiple functions: forwarding financial emails to attacker-controlled addresses and concealing alerts about suspicious activity or password resets. Such rules can persist even after password changes, maintaining unauthorized access.

A notable case involved payroll fraud, where an attacker used a compromised account to create a rule that archived emails containing specific financial terms. The attacker also registered a deceptive domain using homoglyph characters through Zoho, leveraging the mailbox rule to intercept verification emails and complete fraudulent actions.

Mitigation and Security Recommendations

To counter this threat, organizations must take proactive measures. Disabling automatic external forwarding in Exchange Online is crucial, as it closes a commonly exploited persistence path. Implementing multi-factor authentication (MFA) with conditional access policies can reduce initial compromise risks.

Regularly auditing mailbox rules, monitoring OAuth consent grants, and reviewing sign-in logs for unusual activity are essential steps in detecting and mitigating these threats. Ensuring that security teams are vigilant can significantly limit exposure to rule-based exploits.

Stay updated with the latest cybersecurity news by following us on Google News, LinkedIn, and X. For more insights, set CSN as your preferred source in Google.

Cyber Security News Tags:business email compromise, cloud security, cyber threats, Cybersecurity, data breach, email security, Exchange Online, Hackers, malicious rules, Microsoft 365, Microsoft Outlook, multi-factor authentication, OAuth, Phishing, Proofpoint

Post navigation

Previous Post: Unregistered Domain Threatened 25,000 Endpoints Globally
Next Post: Mirax RAT Threatens Android Users Across Europe

Related Posts

Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users Cyber Security News
CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices Cyber Security News
New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently Cyber Security News
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk Cyber Security News
Washington Post Oracle E-Suite Hack Impacts 9K+ Employees and Contractors Washington Post Oracle E-Suite Hack Impacts 9K+ Employees and Contractors Cyber Security News
Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • WordPress Plugins Compromised by Hidden Malware Backdoor
  • Hackers Exploit Google Cloud to Deliver Remcos RAT
  • Trump Advocates for Extending Surveillance Program Amid Privacy Concerns
  • MuddyWater-Style Cyber Attack Targets Middle Eastern Sectors
  • Ivanti Neurons for ITSM Vulnerabilities Resolved

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • WordPress Plugins Compromised by Hidden Malware Backdoor
  • Hackers Exploit Google Cloud to Deliver Remcos RAT
  • Trump Advocates for Extending Surveillance Program Amid Privacy Concerns
  • MuddyWater-Style Cyber Attack Targets Middle Eastern Sectors
  • Ivanti Neurons for ITSM Vulnerabilities Resolved

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark