‘It’s more common than you think’: Experts reveal how hackers are trying to hijack your inbox with these clever tactics



  • Proofpoint highlights inbox rules as key persistence tactic in email breaches
  • Attackers use rules to hide alerts, forward data, and bypass password changes
  • ~10% of compromised accounts in Q4 2025 had malicious rules created within seconds of access

When taking over a person’s inbox, there is one specific, very popular technique cybercriminals use to maintain persistence, exfiltrate data without being spotted, and impersonate their victims – despite it not being malicious on its own, experts have warned.

Security researchers Proofpoint published a report highlighting the use of inbox rules in cybercrime – automated instructions that sort, move, delete, or forward incoming messages based on specific conditions that the user sets up.


https://cdn.mos.cms.futurecdn.net/UuEwW9ycb2JBzQngywr5XK-2560-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

Leave a reply

Please enter your comment!
Please enter your name here

spot_imgspot_img