MEDIUMVulnerability
Global
Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat
·Source: Infosecurity Magazine
Updated:
Executive Summary
Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn
Analysis
Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn