Common Information
Type | Value |
---|---|
Value |
Outlook Rules - T1137.005 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. Outlook rules allow a user to define automated behavior to manage email messages. A benign rule might, for example, automatically move an email to a particular folder in Outlook if it contains specific words from a specific sender. Malicious Outlook rules can be created that can trigger code execution when an adversary sends a specifically crafted email to that user.(Citation: SilentBreak Outlook Rules) Once malicious rules have been added to the user’s mailbox, they will be loaded when Outlook is started. Malicious rules will execute when an adversary sends a specifically crafted email to the user.(Citation: SilentBreak Outlook Rules) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-09-24 | 0 | Microsoft Outlook Forensic Analysis: A Deep Dive into Email Investigations | ||
Details | Website | 2022-01-23 | 0 | Manage email messages by using rules | ||
Details | Website | 2020-11-23 | 4 | A Fresh Outlook on Mail Based Persistence - MDSec | ||
Details | Website | 2018-12-12 | 2 | Rule your inbox with Microsoft Cloud App Security | ||
Details | Website | 2018-02-25 | 2 | Hexacorn | Blog How to become the best SOC Analyst E-V-E-R | ||
Details | Website | 2017-10-11 | 20 | GitHub - sensepost/notruler: The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange. | ||
Details | Website | 2017-09-22 | 2 | “Tasking” Office 365 for Cobalt Strike C2 | ||
Details | Website | 2015-12-04 | 17 | Malicious Outlook Rules - NetSPI |