| ID | Name |
|---|---|
| T1114.001 | Local Email Collection |
| T1114.002 | Remote Email Collection |
| T1114.003 | Email Forwarding Rule |
Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a user’s local system, such as Outlook storage or cache files.
Outlook stores data locally in offline data files with an extension of .ost. Outlook 2010 and later supports .ost file sizes up to 50GB, while earlier versions of Outlook support up to 20GB.[1] IMAP accounts in Outlook 2013 (and earlier) and POP accounts use Outlook Data Files (.pst) as opposed to .ost, whereas IMAP accounts in Outlook 2016 (and later) use .ost files. Both types of Outlook data files are typically stored in C:\Users\<username>\Documents\Outlook Files or C:\Users\<username>\AppData\Local\Microsoft\Outlook.[2]
| ID | Name | Description |
|---|---|---|
| G0006 | APT1 |
APT1 uses two utilities, GETMAIL and MAPIGET, to steal email. GETMAIL extracts emails from archived Outlook .pst files.[3] |
| S0030 | Carbanak |
Carbanak searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server.[4] |
| G0114 | Chimera |
Chimera has harvested data from victim's e-mail including through execution of |
| S0050 | CosmicDuke |
CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration.[6] |
| S0115 | Crimson |
Crimson contains a command to collect and exfiltrate emails from Outlook.[7] |
| S0367 | Emotet |
Emotet has been observed leveraging a module that scrapes email data from Outlook.[8] |
| S0363 | Empire |
Empire has the ability to collect emails on a target system.[9] |
| S0526 | KGH_SPY | |
| S1142 | LunarMail |
LunarMail can capture the recipients of sent email messages from compromised accounts.[11] |
| G0059 | Magic Hound |
Magic Hound has collected .PST archives.[12] |
| C0002 | Night Dragon |
During Night Dragon, threat actors used RAT malware to exfiltrate email archives.[13] |
| S0594 | Out1 | |
| S0192 | Pupy |
Pupy can interact with a victim’s Outlook session and look through folders and emails.[15] |
| S0650 | QakBot |
QakBot can target and steal locally stored emails to support thread hijacking phishing campaigns.[16][17][18] |
| G1039 | RedCurl |
RedCurl has collected emails to use in future phishing campaigns.[19] |
| G1041 | Sea Turtle |
Sea Turtle collected email archives from victim environments.[20] |
| S0226 | Smoke Loader |
Smoke Loader searches through Outlook files and directories (e.g., inbox, sent, templates, drafts, archives, etc.).[21] |
| G1035 | Winter Vivern |
Winter Vivern delivered malicious JavaScript payloads capable of exfiltrating email messages from exploited email servers.[22] |
| ID | Mitigation | Description |
|---|---|---|
| M1041 | Encrypt Sensitive Information |
Use of encryption provides an added layer of security to sensitive information sent over email. Encryption using public key cryptography requires the adversary to obtain the private certificate along with an encryption key to decrypt messages. |
| M1060 | Out-of-Band Communications Channel |
Implement secure out-of-band alerts to notify security teams of unusual local email activities, such as mass forwarding or large attachments being sent, indicating potential data exfiltration attempts.[23] |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0047 | Detect Local Email Collection via Outlook Data File Access and Command Line Tooling | AN0130 |
Detection focuses on processes that attempt to locate, access, or exfiltrate local Outlook data files (.pst/.ost) using file system access, native Windows utilities (e.g., PowerShell, WMI), or remote access tools with file browsing capabilities. The behavior chain includes directory enumeration, file access, optional compression or staging, and network transfer. |