Additional Email Delegate Permissions (T1098.002)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Bienstock, D.. (2019). BECS and Beyond: Investigating and Defending O365. Retrieved September 13, 2019. Bienstock, D. - Defending O365 - 2019
Crowdstrike. (2018, July 18). Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises. Retrieved January 19, 2020. Crowdstrike Hiding in Plain Sight 2018
Google. (2011, June 1). Ensuring your information is safe online. Retrieved April 1, 2022. Google Ensuring Your Information is Safe
Google. (n.d.). Turn Gmail delegation on or off. Retrieved April 1, 2022. Gmail Delegation
Mandiant. (2018). Mandiant M-Trends 2018. Retrieved July 9, 2018. FireEye APT35 2018
Mandiant. (2021, January 19). Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452. Retrieved January 22, 2021. Mandiant Defend UNC2452 White Paper
Microsoft. (n.d.). Add-Mailbox Permission. Retrieved September 13, 2019. Microsoft - Add-MailboxPermission