Big Tech
Apr 14, 2026
Big Tech


Malicious mailbox rules inside Microsoft 365 are emerging as one of the most quietly effective post-exploitation tools in the modern attacker's arsenal — and UAE organisations are bearing a disproportionate share of the damage. New data from Q4 2025 shows one in ten compromised accounts had a malicious rule created within hours of initial access. This is how the attack works, why it is so hard to detect, and what security teams must do now.
[For more news, click here]
There are no exotic exploits here. No zero-days. No custom malware deployed across a network perimeter. In a growing number of enterprise breaches across the UAE and wider MENA region, attackers are achieving persistence, exfiltration, and full communication control using a feature every Microsoft 365 user interacts with daily: the humble inbox rule.
What makes this threat particularly dangerous for CISOs is precisely its mundanity. Mailbox rules are native, expected, and trusted. Security tooling tuned to detect anomalous processes or lateral movement often has no visibility into what is happening at the application layer of a cloud email platform. By the time a suspicious rule is identified, the attacker may have been silently harvesting communications for weeks.
Tech Revolt's investigation, drawing on incident response data, threat intelligence from the UAE Cybersecurity Council, and research from Proofpoint, examines how this attack vector works in practice — and why it demands more attention from security leadership than it is currently receiving.
Before a single mailbox rule is created, an attacker needs inside the environment. In Microsoft 365, the most common initial access routes are well-documented but persistently effective:
The scale of the threat environment matters here. The UAE Cybersecurity Council records between 90,000 and 200,000 attempted cyberattacks targeting the country every single day. Against that volume, even a small percentage of successful initial access events translates into a significant number of compromised environments.
Once inside, the attacker's priority is not disruption — it is invisibility.
Native Microsoft 365 mailbox rules allow users to automatically sort, forward, delete, or flag incoming email based on defined criteria. Attackers have learned to repurpose this functionality with surgical precision.
Analysis of compromised accounts across Q4 2025 found that approximately 10% had at least one malicious mailbox rule created shortly after initial access — a figure that security teams should treat as significant underreporting, given how infrequently these rules are actively audited.
The attack objectives this technique serves fall into four categories:
Rules are configured to automatically forward emails matching high-value keywords — "invoice," "wire transfer," "contract," "payroll" — to external, attacker-controlled mailboxes. The data leaves the organisation continuously, automatically, and without triggering conventional data loss prevention alerts because it uses a legitimate platform feature.
Rules that silently delete, mark as read, or redirect emails can neutralise the very notifications designed to expose the attacker. Password reset confirmations, MFA enrollment alerts, suspicious login warnings, and replies flagging unusual behaviour are all candidates for suppression. The victim sees nothing. The attacker maintains control.
This is the detail that should concern CISOs most. Auto-forwarding rules survive password resets. If a compromised account has its password changed but the malicious rule is not identified and removed, the attacker retains full visibility into that mailbox indefinitely. The rule is the persistence mechanism — not the credential.
By routing specific correspondence to hidden folders, then responding from the compromised account, attackers can intercept ongoing business conversations, impersonate the account holder, and manipulate vendor or financial communications — all without touching the network layer. Unlike traditional man-in-the-middle attacks, there is no traffic to intercept. The platform does the work.
The following incident, drawn from incident response observations, illustrates how these techniques combine in a real-world attack chain.
Initial access was gained on an account belonging to an Accounting Specialist — a role with natural visibility into financial correspondence, vendor communications, and payment processes. Shortly after access was obtained, the attacker created a mailbox rule targeting any email containing "Payment Receipt" in the subject or body, automatically moving matching messages to the Archive folder. The victim had no visibility into these emails. The attacker did.
From this foothold, the attacker launched an internal phishing campaign targeting 45 additional users within the same organisation. The campaign's centrepiece was a "Payroll Enrollment" email sent from the compromised Accounting Specialist account — a trusted internal sender — to the company's payroll specialist, designed to initiate a fraudulent payroll-related transaction.
The mailbox rules played a decisive role at this stage. Any replies flagging the email as suspicious, any security alerts, any inter-departmental warnings — all were suppressed before they reached the compromised account's inbox. The attack had, in effect, given itself a clean operational environment inside the target's own infrastructure.
This attack chain — credential compromise, rule creation, alert suppression, internal phishing, financial fraud — is not an edge case. It is a repeatable playbook.
The 77% of UAE CISOs who reported material data loss in the past year — as documented in Proofpoint's research — are not failing because of a lack of security investment. Many are failing because their detection models were not built for this class of attack.
Several factors work in the attacker's favour:
Addressing this threat requires action across three phases: prevention, detection, and response.
When a malicious mailbox rule is identified, the following steps are not optional:
The UAE's position as a regional technology and financial hub makes its organisations high-value targets. The combination of a sophisticated attacker community, a rapidly expanding cloud-first enterprise environment, and a daily attack volume measured in the hundreds of thousands creates a threat landscape that demands corresponding sophistication in defence.
Mailbox rule abuse will not be the last time attackers weaponise a platform's native features against its users. The pattern — gain access, use legitimate tools, stay invisible — is the defining characteristic of modern cloud-native adversaries. Security programmes that are still primarily oriented around perimeter defence and malware detection are structurally unprepared for it.
The entry point, as the data consistently shows, remains email. Seventy-five percent of attacks in the UAE begin with a phishing email. That single statistic should be the starting point for every security team's 2026 threat model.
Related Articles