DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Security

Attackers Misusing Email Inbox Rules

DigitalCIO Bureau by DigitalCIO Bureau
September 22, 2023
in Security, Tech News
0
Attackers Misusing Email Inbox Rules
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Barracuda has unveiled a new Threat Spotlight, that shows how attackers can misuse inbox rules in a successfully compromised account to evade detection while they – among other things – quietly move information out of the corporate network via the breached inbox. Not only this, but attacks can also ensure that the victims don’t see security warnings, file selected messages in obscure folders so the victim won’t easily find them or delete messages from the senior executive they are pretending to be in an attempt to extract money.

“The abuse of email inbox rules is a brilliantly effective attack tactic that provides stealth and is easy to implement once an attacker has compromised an account,” said Prebh Dev Singh, Manager, Email Protection Product Management at Barracuda. “Even though email detection has advanced over the years, and the use of machine learning has made it easier to spot suspicious rule creation – our detection numbers show that attackers continue to implement this technique with success. Malicious rule creation poses a serious threat to the integrity of an organization’s data and assets. Because it is a post-compromise technique, it’s a sign that that attackers are already in your network. Immediate action is required to get them out.”

Speaking on this issue, Parag Khurana, Country Manager, Barracuda Networks (India) Pvt Ltd, commented on the efficacy of this attack methodology: “The abuse of email inbox rules offers attackers both stealth and ease of execution once they compromise an account. In the Indian context, where cybersecurity challenges are constantly evolving, it is imperative that organizations adopt advanced defense measures and robust email security strategies to safeguard against threats. Barracuda remains committed to assisting Indian businesses in their cybersecurity journey, providing cutting-edge solutions to thwart attacks and protect data.”

The Clandestine Potential of Email Inbox Rules

Once an attacker successfully breaches a victim’s email account, they can create automated email rules to establish persistent access to the inbox. These rules can empower attackers to – Steal Information or Money: Attackers can configure rules to forward emails containing sensitive keywords like “payment” or “confidential” to external addresses, enabling them to purloin valuable information or funds while evading detection.

Conceal Inbound Emails: By relocating crucial inbound emails such as security alerts to obscure folders or erasing them, attackers can ensure victims remain oblivious to potential threats or command-and-control communications. Gather Intelligence: Attackers can surveil victims’ activities and amass intelligence on individuals and organizations, potentially for use in subsequent exploits or operations.

Facilitate Business Email Compromise (BEC): In the case of attacks on businesses, perpetrators may set rules to delete incoming emails from specific colleagues, enabling them to impersonate key figures like the CFO and deceive colleagues into transferring funds to accounts controlled by the attackers.

Notably, these malicious rules can persist even if the victim changes their password, activates multi-factor authentication, or imposes stringent access policies. As long as the rule remains undetected, it poses a substantial threat.

Effective Defense Measures Against Malicious Email Inbox Rules

Prevention remains the most effective protection against the exploitation of email inbox rules. Detecting and mitigating the repercussions of breached accounts necessitates comprehensive measures, including: Comprehensive Visibility: Organizations need insight into every action occurring within employees’ inboxes, encompassing rule creation, modifications, logon history, email context, and more. AI-Based Protection: Leveraging artificial intelligence, organizations can construct intelligent user profiles to discern subtle irregularities and promptly flag them for attention. Impersonation Protection: Employing multiple signals, including login and email data, to pinpoint account takeover attempts. Extended Detection and Response (XDR): Solutions such as Barracuda’s XDR Cloud Security, coupled with round-the-clock monitoring by a Security Operations Center (SOC), ensure that even deeply concealed and camouflaged activities are detected and neutralized.

 

Tags: Barracuda
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Infosys Partners with Harness to Advance AI-Driven Enterprise Transformation and Modernization

by DigitalCIO Bureau
April 10, 2026
0
Infosys Partners with Harness to Advance AI-Driven Enterprise Transformation and Modernization

Infosys and software delivery platform company Harness have announced a strategic collaboration aimed at helping enterprises accelerate transformation and modernization efforts through artificial intelligence-led capabilities. The partnership brings...

Read moreDetails

TCS renews its strategic partnership with Marks and Spencer

by DigitalCIO Bureau
April 10, 2026
0
TCS renews its strategic partnership with Marks and Spencer

Tata Consultancy Services (TCS) announced the renewal of its major, multi year strategic partnership with Marks & Spencer (M&S). This continuing engagement builds on the more than a...

Read moreDetails

Nokia Recognized by GigaOm as “Leader and Outperformer” in Data Center Switching for Fifth Consecutive Year

by DigitalCIO Bureau
April 8, 2026
0
Nokia Recognized by GigaOm as “Leader and Outperformer” in Data Center Switching for Fifth Consecutive Year

Nokia has been recognized by industry research firm GigaOm as a “Leader and Outperformer” in data center switching for the fifth consecutive year, underscoring the company’s strengthening role...

Read moreDetails

New Study Shows an Adaptive Workforce is a Key Characteristic of Top Performing Organizations

by DigitalCIO Bureau
April 8, 2026
0
New Study Shows an Adaptive Workforce is a Key Characteristic of Top Performing Organizations

New research shows that a connected system of workforce intelligence and talent activation yields 11x greater adaptability and 6x higher productivity, with up to 8x stronger financial performance...

Read moreDetails

Tata Play Fiber Collaborates with IBM to Build Next-Gen AI-Ready Data Infrastructure

by DigitalCIO Bureau
April 6, 2026
0
Tata Play Fiber Collaborates with IBM to Build Next-Gen AI-Ready Data Infrastructure

Tata Play Fiber has announced a strategic collaboration with IBM to build a next‑generation, AI‑ready enterprise data lakehouse powered by IBM watsonx. The new platform will unify 25...

Read moreDetails
Next Post
Black Box Laucnhes Its New Center of Excellence

Black Box Laucnhes Its New Center of Excellence

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

The Top Five Benefits of an Intelligent Automation Approach

The Top Five Benefits of an Intelligent Automation Approach

October 27, 2023

NETGEAR Nighthawk AX12 Tri-Band Wi-Fi 6 Router for Improved Network Capacity

February 17, 2020

Businesses face digital ceiling in transformation progress: Infosys study

January 24, 2020

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Infosys Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tata Consultancy Services TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?