...
Expand | ||
---|---|---|
| ||
Adversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems. This detection is triggered when a user reports an email as malware or phishing in Office 365. Source table ➝ |
Expand | ||
---|---|---|
| ||
Adversaries may use the compromised account to send messages to other accounts in the network of the target organization while creating inbox rules. Source table → |