T1137.005 - Outlook Rules
Sub-technique
Tattiche:
Persistence
Persistence
Piattaforme:
Windows Office Suite
Windows Office Suite
Rilevamento:
Not specified
Not specified
Description:
Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. Outlook rules allow a user to define automated behavior to manage email messages. A benign rule might, for example, automatically move an email to a particular folder in Outlook if it contains specific words from a specific sender. Malicious Outlook rules can be created that can trigger code execution when an adversary sends a specifically crafted email to that user.(Citation: SilentBreak Outlook Rules)
Once malicious rules have been added to the user’s mailbox, they will be loaded when Outlook is started. Malicious rules will execute when an adversary sends a specifically crafted email to the user.(Citation: SilentBreak Outlook Rules)
Once malicious rules have been added to the user’s mailbox, they will be loaded when Outlook is started. Malicious rules will execute when an adversary sends a specifically crafted email to the user.(Citation: SilentBreak Outlook Rules)
Malware (1)
Metadata
| MITRE ID: | T1137.005 |
| STIX ID: | attack-pattern--3d1b9d7e-3921-... |
| Piattaforme: | Windows, Office Suite |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |