What's happening in email security: April 13-19, 2026
Attackers don't need to keep logging in. Once they've cracked an M365 account, they're planting mailbox rules within seconds of first access, and those rules survive password resets. They keep quietly siphoning vendor threads long after the incident has been "closed."
Malicious mailbox rules are the post-compromise blind spot nobody patches
Proofpoint researchers found malicious inbox rules in roughly 10% of compromised Microsoft 365 accounts in Q4 2025. The interesting part isn't the rules themselves. It's how fast they're deployed and how long they stick around.
Attackers are creating forwarding and filtering rules within seconds of the first successful login. Tools to automate this across dozens of compromised accounts at once are now commodity. Rule names are a single character or a random string so they slide past admin review.
The mechanics are simple. One rule forwards every message containing "invoice," "payment," or "wire" to an attacker inbox. Another rule moves Microsoft security alerts into the RSS Subscriptions folder, where no one ever looks. A third rule hides replies from legal or IT. The victim has no reason to notice.
Here's the detection gap. Password resets don't touch mailbox rules. A security team spots suspicious activity, forces a reset, issues the all-clear, and the attacker keeps reading every inbound finance email. Proofpoint documented real-world outcomes including payroll hijacking, BEC against live vendor threads where attackers reply directly to active invoice conversations with swapped bank details, and university-scale spam sent from stolen accounts without the owners ever seeing outbound activity.
The BEC angle is what makes this wave different from earlier mailbox rule abuse. Attackers don't have to send any emails themselves. They watch an existing vendor thread, wait for the payment question to land, and insert a forged reply with new wire details. From finance's perspective, they're continuing a conversation they've been in for weeks.
Detection hinges on rule creation events in the Unified Audit Log, rules that forward outside the tenant, rules that move mail into hidden folders like Archive or RSS Subscriptions, and rule names that are a single character or random string. None of this is new tradecraft. What's new is the speed and the automation.
n8n webhooks become the new Dropbox for phishing payloads
Threat actors have been using n8n's legitimate webhook infrastructure since October 2025 to host malware delivery URLs inside phishing emails. The n8n workflows do what webhook.site and Dropbox and Google Drive did before them, routing victims through a trusted domain so reputation-based filters wave the message through.
This is the same pattern email security teams have been fighting for years. The list of abused SaaS platforms keeps growing because the parent domain has to stay on allowlists if the legitimate service is useful to anyone. Random workflow subdomains rotate faster than signature feeds update. The fix is content inspection at the landing page, not domain reputation at the gateway.
Fake data breach alert emails are the latest phishing trap
ESET flagged a scaled phishing tactic that follows the news cycle. Criminals are running campaigns dressed as data breach notifications, sometimes piggybacking on real incidents and sometimes inventing breaches that never happened. The US recorded 3,322 reported breaches in 2025, which produced roughly 280 million legitimate notification emails. That volume has conditioned users to expect "we regret to inform you" messages in their inbox.
AI-generated copy has removed the obvious tells. Grammar is clean. Branding matches. The fake login pages are pixel-accurate. Fake notifications push recipients to "verify" credentials or download what's pitched as a security tool. Expect a measurable spike every time a real breach hits the headlines.
Microsoft tops brand impersonation rankings at 22%
Microsoft stayed at the top of Check Point's Q1 2026 brand impersonation rankings, showing up in 22% of all phishing attempts the firm observed. Apple jumped to second at 11%, a notable shift as attackers lean harder into consumer payment and identity targets. Google (9%), Amazon (7%), and LinkedIn (6%) rounded out the top five, and the top four brands together accounted for roughly half of every phishing attempt Check Point saw.
The techniques are the usual mix. Lookalike domains, QR code redirection inside branded PDFs, and malware delivered from pages styled to match each brand's legitimate download portal. The concentration tells you where attacker infrastructure investment is going. If you run brand monitoring, these five domains are the ones to watch first.
FBI IC3 reports $20.9B in cybercrime losses for 2025, phishing losses triple year over year
The FBI's IC3 2025 annual report landed this week, and the phishing line is the one to flag. Reported phishing and spoofing losses hit $215.8M, up from $70M in 2024 and $18.7M in 2023. Complaint volume barely moved, so per-incident payouts are climbing fast. BEC losses reached $3.05B across 24,768 complaints, with 86% of stolen funds moving via wire or ACH. AI-linked BEC losses specifically came in at $30M. Among victims 60 and older, reported phishing losses nearly quadrupled year over year to $77M.
- FBI and Indonesian police take down the W3LL PhaaS kit
Joint operation seized the adversary-in-the-middle kit behind 17,000+ victims and roughly $20M in attempted fraud, removing a widely used MFA-bypass tool from the PhaaS market.
- Booking.com confirms hackers accessed customer data
Names, email addresses, and phone numbers tied to travel accounts were exposed, which creates a ready-made target list for follow-on phishing impersonating Booking.com.
- Patch Tuesday April 2026 fixes SharePoint zero-day that enables content spoofing
Microsoft patched 167 CVEs including a SharePoint content spoofing zero-day (CVE-2026-32201) that can be chained with phishing for convincing fake-portal BEC lures.
Want email security news in your inbox every week?
Subscribe here and stay up to date with what's happening in email security.




