Adversaries may use email rules to hide inbound emails in a compromised user's mailbox. Many email clients allow users to create inbox rules for various email functions, including moving emails to other folders, marking emails as read, or deleting emails. Rules may be created or modified within email clients or through external features such as the <code>New-InboxRule</code> or <code>Set-InboxRule</code> PowerShell cmdlets on Windows systems.(Citation: Microsoft Inbox Rules)(Citation: MacOS Email Rules)(Citation: Microsoft New-InboxRule)(Citation: Microsoft Set-InboxRule)
Adversaries may utilize email rules within a compromised user's mailbox to delete and/or move emails to less noticeable folders. Adversaries may do this to hide security alerts, C2 communication, or responses to Internal Spearphishing emails sent from the compromised account.
Any user or administrator within the organization (or adversary with valid credentials) may be able to create rules to automatically move or delete emails. These rules can be abused to impair/delay detection had the email content been immediately seen by a user or defender. Malicious rules commonly filter out emails based on key words (such as <code>malware</code>, <code>suspicious</code>, <code>phish</code>, and <code>hack</code>) found in message bodies and subject lines. (Citation: Microsoft Cloud App Security)
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
AC-4 | Information Flow Enforcement | Protects | T1564.008 | Email Hiding Rules |
CM-3 | Configuration Change Control | Protects | T1564.008 | Email Hiding Rules |
CM-5 | Access Restrictions for Change | Protects | T1564.008 | Email Hiding Rules |
CM-7 | Least Functionality | Protects | T1564.008 | Email Hiding Rules |
IR-5 | Incident Monitoring | Protects | T1564.008 | Email Hiding Rules |
SI-3 | Malicious Code Protection | Protects | T1564.008 | Email Hiding Rules |
SI-4 | System Monitoring | Protects | T1564.008 | Email Hiding Rules |
SI-7 | Software, Firmware, and Information Integrity | Protects | T1564.008 | Email Hiding Rules |