DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Security

Attackers Misusing Email Inbox Rules

DigitalCIO Bureau by DigitalCIO Bureau
September 22, 2023
in Security, Tech News
0
Attackers Misusing Email Inbox Rules
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Barracuda has unveiled a new Threat Spotlight, that shows how attackers can misuse inbox rules in a successfully compromised account to evade detection while they – among other things – quietly move information out of the corporate network via the breached inbox. Not only this, but attacks can also ensure that the victims don’t see security warnings, file selected messages in obscure folders so the victim won’t easily find them or delete messages from the senior executive they are pretending to be in an attempt to extract money.

“The abuse of email inbox rules is a brilliantly effective attack tactic that provides stealth and is easy to implement once an attacker has compromised an account,” said Prebh Dev Singh, Manager, Email Protection Product Management at Barracuda. “Even though email detection has advanced over the years, and the use of machine learning has made it easier to spot suspicious rule creation – our detection numbers show that attackers continue to implement this technique with success. Malicious rule creation poses a serious threat to the integrity of an organization’s data and assets. Because it is a post-compromise technique, it’s a sign that that attackers are already in your network. Immediate action is required to get them out.”

Speaking on this issue, Parag Khurana, Country Manager, Barracuda Networks (India) Pvt Ltd, commented on the efficacy of this attack methodology: “The abuse of email inbox rules offers attackers both stealth and ease of execution once they compromise an account. In the Indian context, where cybersecurity challenges are constantly evolving, it is imperative that organizations adopt advanced defense measures and robust email security strategies to safeguard against threats. Barracuda remains committed to assisting Indian businesses in their cybersecurity journey, providing cutting-edge solutions to thwart attacks and protect data.”

The Clandestine Potential of Email Inbox Rules

Once an attacker successfully breaches a victim’s email account, they can create automated email rules to establish persistent access to the inbox. These rules can empower attackers to – Steal Information or Money: Attackers can configure rules to forward emails containing sensitive keywords like “payment” or “confidential” to external addresses, enabling them to purloin valuable information or funds while evading detection.

Conceal Inbound Emails: By relocating crucial inbound emails such as security alerts to obscure folders or erasing them, attackers can ensure victims remain oblivious to potential threats or command-and-control communications. Gather Intelligence: Attackers can surveil victims’ activities and amass intelligence on individuals and organizations, potentially for use in subsequent exploits or operations.

Facilitate Business Email Compromise (BEC): In the case of attacks on businesses, perpetrators may set rules to delete incoming emails from specific colleagues, enabling them to impersonate key figures like the CFO and deceive colleagues into transferring funds to accounts controlled by the attackers.

Notably, these malicious rules can persist even if the victim changes their password, activates multi-factor authentication, or imposes stringent access policies. As long as the rule remains undetected, it poses a substantial threat.

Effective Defense Measures Against Malicious Email Inbox Rules

Prevention remains the most effective protection against the exploitation of email inbox rules. Detecting and mitigating the repercussions of breached accounts necessitates comprehensive measures, including: Comprehensive Visibility: Organizations need insight into every action occurring within employees’ inboxes, encompassing rule creation, modifications, logon history, email context, and more. AI-Based Protection: Leveraging artificial intelligence, organizations can construct intelligent user profiles to discern subtle irregularities and promptly flag them for attention. Impersonation Protection: Employing multiple signals, including login and email data, to pinpoint account takeover attempts. Extended Detection and Response (XDR): Solutions such as Barracuda’s XDR Cloud Security, coupled with round-the-clock monitoring by a Security Operations Center (SOC), ensure that even deeply concealed and camouflaged activities are detected and neutralized.

 

Tags: Barracuda
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Auditors To Focus on Security, Data Governance and Compliance in 2026

by DigitalCIO Bureau
November 16, 2025
0
Zoom launches all-in-one compliance solution

Cybersecurity vulnerabilities, data governance and regulatory compliance are three of the most common risk areas expected to be included in 2026 internal audit plans, according to Gartner, a...

Read moreDetails

Hexaware Appoints Aditya Jayaraman as Country Head, India

by DigitalCIO Bureau
November 14, 2025
0
Hexaware Appoints Aditya Jayaraman as Country Head, India

Hexaware Technologies has announced the appointment of Aditya Jayaraman as Country Head, India. He will lead Hexaware’s India strategy and growth agenda for enterprises and global capability centers...

Read moreDetails

Hexaware Technologies Launch Insurance Solutions for Google Cloud

by DigitalCIO Bureau
November 13, 2025
0
Coforge and Newgen Elevates Partnership

Hexaware Technologies has announced the launch of two new insurance solutions developed exclusively for Google Cloud. The offerings strengthen Hexaware’s collaboration with Google and reflect a shared focus...

Read moreDetails

Barracuda Unveils AI-Powered Assistant

by DigitalCIO Bureau
November 12, 2025
0
Barracuda Unveils AI-Powered Assistant

Barracuda Networks has announced the launch of Barracuda Assistant, powered by Barracuda AI. Integrated into the BarracudaONE cybersecurity platform, Barracuda Assistant accelerates security operations to help organizations strengthen cyber...

Read moreDetails

Password Alert: ‘123456’ And ‘Minecraft’ Remain Most Used

by DigitalCIO Bureau
November 10, 2025
0
World Password Day: “Focus must shift from relying on passwords alone to building integrated, intelligent security”

Despite repeated warnings from security experts, internet users continue to choose extremely weak and predictable passwords en masse. A new study by cybersecurity firm Comparitech shows that "123456,"...

Read moreDetails
Next Post
Black Box Laucnhes Its New Center of Excellence

Black Box Laucnhes Its New Center of Excellence

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Why You Cannot Book Tickets in IRCTC Website Using Certain Computers

January 21, 2019
BD Soft join hands with TSPlus as Exclusive Country Partner for remote support for Indian Markets

BD Soft join hands with TSPlus as Exclusive Country Partner for remote support for Indian Markets

April 8, 2024

How are Robots Changing the Healthcare Sector

February 28, 2020

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?