Email Rules: The “Hidden” Attack Strategy
I recently read an article about a growing email “threat vector” impacting Microsoft 365 (M365) users, that exploits email rules, forms, and connectors on email clients and servers, particularly in the work environment. If you use the M365 email client as part of your home subscription, you also can be susceptible to this means of compromise.
The threat involves server-side email deployments like malicious connectors, rules, and apps that keep working even after you change your password. To describe the role of a connector, think of your email as a house. Your inbox is the living room where you first see the messages. There you have rules which act as little helpers to guide your guests to specific “rooms” in your house. “If the rule is ‘newsletter,’ the email goes in that room over there.” Connectors control how email flows in and out of your house to integrate to other mail systems or services.
Attackers love anything that lives on any server (not just your device) that keeps working after you change your password or buy a new laptop/device. For home users, similar “invisible plumbing” shows up as server-side inbox rules and mail forwarding as well as compromised and malicious apps with ongoing access.
As with so many other breeches, attackers attempt to gain access to your email account with a simple phish:
- A fake email: “Click here to view the document.”
- A fake meeting invite or voicemail that asks you to sign in.
- A page that looks like Microsoft asking you to approve an app.
If you fall for the phish and enter your username and password or click “Allow” to grant an app permission, the attacker now can access your account.
Once inside, attackers don’t just read your email and leave. They often set up long-term access where they can hide their tracks and steal money or data over time:
- Forward certain emails (e.g., those with “bank”, “invoice”, “password”) to themselves.
- Move/delete emails so you never see the security alerts, bank messages, or replies that might expose the scam.
This is very similar in spirit to a malicious connector in that it’s a trusted-looking configuration on the cloud server that silently keeps the attacker connected.
This really matters for home users because if your personal M365/Outlook.com address is your “main email,” it’s probably the recovery point for your:
- Bank and credit card accounts,
- PayPal, shopping sites, and subscriptions,
- Social media and maybe even crypto or investment accounts.
If an attacker has ongoing access to your mailbox, they can repeatedly:
- Reset passwords on other sites and take over those accounts.
- Watch for statements, tax docs, and IDs for identity theft.
- Impersonate you to friends and family (“Can you send me money?”)
In other words, it’s not just about reading your email, it’s about controlling your digital life.
So, what can you do in such a situation? First recognize the warning signs that something’s wrong.
Watch for:
- Password reset emails that never arrive.
- Friends or family asking, “Why did you send me that weird link?”
- Security alerts from Microsoft or your bank about logins you don’t recognize.
- Emails that people say they sent you, but you can’t find anywhere—not even in the Junk or Deleted folders.
These are the common symptoms seen in real cases where malicious rules or server-side settings were in play.
While this all seems scary, you can develop your own home-user “incident response plan” by:
- Mail /Rules and deleting anything you don’t recognize.
- Mail /Forwarding and turning off forwarding unless you set it.
Even if you’re just one person with a home Microsoft 365 account, you’re still using the same powerful cloud platform as big businesses and attackers know it. So don’t just think “password and antivirus,” think, “What could keep working after I change my password?”
By remembering to occasionally check your email rules, forwarding, and connected apps, you’ll be miles ahead of most people and much harder for attackers to exploit.
Karen Clay, Clay Technology and Multimedia
Courtesy, Karen Clay 