Sunday, April 19, 2026

Hackers Exploit Hidden Microsoft 365 Mailbox Rules to Steal Sensitive Business Emails

Attackers are quietly abusing Microsoft 365 mailbox rules to steal emails, hide alerts, and maintain long-term access without installing malware.

These stealthy tactics are increasingly common in business email compromise (BEC) campaigns targeting enterprise users worldwide.

After gaining initial access often through phishing, password spraying, or compromised OAuth tokens attackers focus on persistence and stealth.

Rather than deploying malware, they weaponize legitimate features like Outlook’s mailbox rules to control email flow. These rules are meant to organize inboxes, but in an attacker’s hands, they become powerful tools for exfiltration and deception.

Mailbox rules allow hackers to delete, forward, or move incoming messages automatically. Malicious actors use them to intercept financial emails, suppress security warnings, or redirect messages to hidden folders such as “Archive” or “RSS Subscriptions.”

Because no network interception is needed, victims continue normal communication completely unaware that their inbox is being filtered behind the scenes.

Exploiting Stealth and Persistence

According to 2025 security telemetry, about 10% of compromised Microsoft 365 accounts showed malicious rule creation within seconds of the initial breach.

During Q4 2025 approximately 10% of compromised user accounts had at least one malicious mailbox rule created shortly after initial access. The minimal time of mail rules creation after an ATO is around 5 seconds. 

Rule creation example in Microsoft Outlook (Source : Proofpoint).
Rule creation example in Microsoft Outlook (Source : Proofpoint).

The rules often had trivial names like “.”, “..”, or “;”, a pattern researchers say reflects both automation and overconfidence attackers don’t expect anyone to look there.

Even after a password reset, these rogue rules persist. Unless administrators manually review and remove them, auto-forwarding and message suppression continue, leaking sensitive information or blocking legitimate alerts.

One confirmed case involved a payroll staff member’s mailbox rule that moved any email with “Payment Receipt” in the subject line to “Archive.”

Attackers later used that same subject in an internal phishing campaign, hiding replies and extending access into executive accounts for payroll fraud.

The mailbox rule was already in place, all verification emails and correspondence from Zoho were automatically hidden in the ‘RSS Subscriptions’ folder. 

Zoho Verification Code (Source : Proofpoint).
Zoho Verification Code (Source : Proofpoint).

Mailbox rules are enabling a new variant of man‑in‑the‑middle behavior conducted entirely within Microsoft 365.

In one incident, attackers hid emails from Zoho in a hidden folder, registered a fake domain using homoglyphs to mimic the victim’s company name, and hijacked a vendor transaction thread all without maintaining persistent control of the original account.

The end goal: convincing the vendor to send duplicate payments to attacker‑controlled accounts.

Large‑Scale Automation

This tactic is now being automated. Attackers use Microsoft Graph or PowerShell scripts to mass‑create malicious rules across multiple users in seconds.


University fake job scam example (Source : Proofpoint).
University fake job scam example (Source : Proofpoint).

Proofpoint researchers demonstrated this capability with a tool called ATOLS, which can capture stolen session tokens and immediately create attacker‑defined mailbox rules upon login no credentials needed once tokens are in hand.

Microsoft 365 administrators can take clear steps to mitigate these risks:

  • Disable external auto‑forwarding to prevent data exfiltration.
  • Enforce MFA and conditional access policies to limit token replay and brute‑force success.
  • Continuously monitor new mailbox rules and OAuth consent changes, especially those involving mail‑read or write permissions.

Mailbox rules may look like harmless productivity tools, but in the wrong hands, they act as invisible backdoors for BEC and espionage. Regular audits and user awareness are now essential for defending against this silent threat inside the inbox.

Follow us on Google NewsLinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

Mayura Kathir
Mayura Kathirhttps://gbhackers.com/
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Hot this week

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep Web The deep web, invisible web, or...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything...

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an...

Web Server Penetration Testing Checklist – 2026

Web server pentesting is performed under three significant categories: identity,...

Researcher Claims Claude Opus Enabled Creation of Working Chrome Exploit

A security researcher has shown that Anthropic’s Claude Opus...

Nexcorium Mirai Variant Weaponises TBK DVR Vulnerability in Fresh IoT Botnet Push

A newly discovered Mirai malware variant named Nexcorium is...

TP-Link Routers Hit by Mirai in CVE-2023-33538 Attacks

Hackers are actively scanning for vulnerable TP-Link home routers...

SEO Poisoning Attack Uses Microsoft Binary to Install RMM Tool

New research has exposed a search engine poisoning campaign...

Operation PowerOFF Knocks Out 75,000 DDoS Attackers and Over 50 Service Domains

A major international law enforcement campaign has hit the...

Industrial Systems Hit by New Email-Worm Threat Wave

Email-borne worms are driving a fresh wave of incidents...

OpenAI Extends GPT-5.4-Cyber Access to Trusted Organizations Worldwide

OpenAI has announced the expansion of its "Trusted Access...

Microsoft Acknowledges Reboot Loop Issue on Windows Servers Following April Patches

Microsoft has confirmed a critical known issue affecting Windows...

Related Articles

Recent News