‘It’s more common than you think’: Experts reveal how hackers are trying to hijack your inbox with these clever tactics


  • Proofpoint highlights inbox rules as key persistence tactic in email breaches
  • Attackers use rules to hide alerts, forward data, and bypass password changes
  • ~10% of compromised accounts in Q4 2025 had malicious rules created within seconds of access

Taking over someone’s inbox is one specific, highly popular technique cybercriminals use to maintain persistence, exfiltrate data undetected and impersonate their victims – although not malicious in itself, experts have warned.

Security researchers Proofpoint published a report highlighting the use of inbox rules in cybercrime – automated instructions that sort, move, delete or forward incoming messages based on specific conditions set by the user.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top