‘It’s more common than you think’: Experts reveal how hackers are trying to hijack your inbox with these clever tactics


  • Proofpoint Highlights Inbox Rules as Key Persistence Tactic for Email Breaches
  • Attackers use rules to hide alerts, transfer data, and bypass password changes.
  • About 10% of compromised accounts in Q4 2025 had malicious rules created within seconds of access.

When taking over a person’s inbox, cybercriminals use a specific technique that’s popular to maintain persistence, exfiltrate data without being detected, and impersonate their victims – even if it’s not malicious in itself, experts have warned.

Security researchers Proofpoint have released a report highlighting the use of inbox rules in cybercrime: automated instructions that sort, move, delete or forward incoming messages based on specific conditions set by the user.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top