This is the blog of Ronald Bartels that wanders on and off the subject of problem management (that is how it started), but it is best described by Ray who says this is Daddy's thoughts! Like the best music is from the Eighties and a wee dram helps in solving most inconveniences.
Hidden Inbox Rules in Microsoft Exchange
In recent investigations, Compass recognized a raise in popularity for
attackers to compromise Microsoft Exchange credentials. As one of the
first steps after having obtained the credentials (most commonly through
phishing), attackers created malicious inbox rules to copy in- and
outgoing emails of their victim. The attacker’s goal hereby was to
guarantee access to emails even after the compromised credentials were