'It's more common than you think': Experts reveal how hackers try to hijack your inbox with these clever tactics



  • Proofpoint Highlights Inbox Rules as Key Persistence Tactic in Email Leaks
  • Attackers use rules to hide alerts, forward data and prevent password changes
  • ~10% of compromised accounts in Q4 2025 had malicious rules created within seconds of access

When they take over a person's inbox, there is a specific and very popular technique that cybercriminals use to maintain persistence, exfiltrate data undetected and impersonate their victims, even though it is not malicious in itself, experts warned.

Security researchers Proofpoint published a report highlighting the use of inbox rules in cybercrime: automated instructions that classify, move, delete or forward incoming messages based on specific conditions set by the user.



scroll to top