AI Phishing in 2026: Why Microsoft 365 Users Are Still Getting Caught (and What To Monitor)
Phishing as cybercrime is as old as time, particularly given how little effort is required and how effective it is. But now, we’re entering a new era: AI makes phishing even faster and tailored, meaning user vigilance alone isn’t a reliable primary control anymore.
What does that mean? Rather than perfect prevention, you’ll now have to look into fast detection and fast containment when an account has been compromised.
In this post, we’ll give you a step-by-step takeover path and a monitoring shortlist for Microsoft 365 and Entra ID.
AI has made phishing faster, more convincing, and harder to spot. This guide shows what to monitor in Microsoft 365 and Entra ID, so you can detect account takeovers early, spot persistence like rules and forwarding, and contain them before they turn into fraud.
Why AI Phishing Breaks the Usual Warning Signs
Why does old advice not hold up anymore? Vague, poorly formatted emails and weird domains were the telltale signs of phishing emails in the past. In 2026, AI allows attackers to tailor emails to roles, use industry language, refer to current events and even internal context – in different languages and even imitating the tone (one of the most obvious signs in the past) of the sender. Besides this, attacks are now moving to different platforms – from email to Teams/SharePoint links, QR codes or supplier impersonations.
Additionally, AI allows rapid iteration - A/B testing what works and what doesn’t, plus creating convincing landing pages to trick you faster than ever.
What does that mean for you? Simple: more controls and monitoring – which also shifts the blame from the user.
So – what does a typical Microsoft 365 takeover look like?
(Click on a heading to expand.)
The Common Microsoft 365 Takeover Path (Step by Step)
1) Initial Lure (Email, Teams Link, Shared Document)
What It Looks Like
- To a user: a believable message that fits their role: “updated contract”, “invoice query”, “Teams meeting notes”, “SharePoint file shared with you”, DocuSign-style request, “password expires today”
- To IT: often nothing malicious yet. Links may use legitimate services (SharePoint/OneDrive, file hosting, URL shorteners) and the sender may be:
- an external lookalike domain, or
- a real compromised supplier/customer account.
AI makes these lures far more convincing and targeted, so you should assume some will land and be clicked. As a result, your protection strategy shifts from stopping every click to limiting what happens after the click.
2) Credential or Session Capture (Fake Login Page, Adversary-in-the-Middle)
What It Looks Like
- To a user: a Microsoft-looking sign-in prompt. They enter credentials, maybe approve multi-factor authentication (MFA), and then still end up at a real page (so it feels normal).
- To IT: two common patterns:
- Credential harvest: attacker steals username/password, then tries to log in elsewhere.
- Adversary-in-the-middle (AiTM): attacker acts as a proxy between the user and Microsoft, capturing not just the password but the session token/cookie so they can “be” the user without re-entering credentials.
This is the point where just having MFA isn’t enough. If a session token (cookie – data that proves you’re already authenticated) is stolen, an attacker can often access services as a valid session.
The best detection now comes from sign-in context (new device/location/client) and post-login behaviours (mailbox rules, forwarding, OAuth consent).
3) Access Gained (Successful Sign-In, New Device/Session)
What It Looks Like
- To a user: usually nothing. They might just notice odd MFA prompts.
- To IT: you may see:
- a successful sign-in from a new location or new device
- a new client type (browser vs desktop, different device OS)
- a short burst of failed logins before a success (spray then hit)
- sign-ins at unusual times for that user.
- To a user: emails “go missing”, suppliers say they replied but you never saw it, finance conversations become oddly one-sided.
- To IT: high-signal changes such as:
- new inbox rules (move/hide/delete messages)
- external auto-forwarding turned on
- new delegates or mailbox permissions (“Send As”, “Full Access”)
- a new OAuth app granted permissions (mail/files), sometimes by the user unknowingly.
If you catch it here, you can stop the whole chain before it becomes fraud or ransomware. You want to start investigating immediately if you see a new sign-in context combined with a high-risk user, and unusual follow-on actions.
4) Persistence Set (Mailbox Rules, Forwarding, OAuth Consent, Delegate Access)
This is where Business Email Compromise (BEC) becomes hard to spot.
What It Looks Like
- To a user: emails “go missing”, suppliers say they replied but you never saw it, finance conversations become oddly one-sided.
- To IT: high-signal changes such as:
- new inbox rules (move/hide/delete messages)
- external auto-forwarding turned on
- new delegates or mailbox permissions (“Send As”, “Full Access”)
- a new OAuth app granted permissions (mail/files), sometimes by the user unknowingly.
Persistence means the attacker can keep control even if the user changes password later. That also allows attackers to hide replies and intercept payment conversations, which is the core of BEC.
5) Internal Reconnaissance (Searching Mail, SharePoint, Teams)
What It Looks Like
- To a user: still often invisible.
- To IT: activity that looks legitimate but is unusual in volume or pattern:
- searching inbox for “invoice”, “bank”, “payment”, “remittance”, “account details”
- opening recent threads with suppliers
- reviewing org charts, Teams chats, SharePoint folders
- downloading files or trawling shared sites.
Attackers are learning the business: who approves payments, what language is used, typical invoice amounts, supplier contacts. And this is why the fraud attempts can look eerily authentic.
6) Business Exploitation (Invoice Redirection, Supplier Change Requests, BEC)
What It Looks Like
- To CEOs/finance: “Please update our bank details”, “Urgent payment today”, “I’m in meetings, just do it”, or a believable supplier thread continuation.
- To IT: suspicious sending patterns:
- new external recipients
- replies sent from the compromised mailbox but not seen by the user (because of rules)
- creation of new mail flow patterns or lookalike domains in communications.
This is where money moves. Apart from detection speed, process controls protect your business, such as call-back verification and two-person approval. Your business needs pre-agreed rules so finance can stop payments without waiting for perfect certainty.
7) Cover Tracks (Hide Replies, Delete Security Alerts, Move Items)
What It Looks Like
- To a user: “I never received that email” or “my sent items look odd”.
- To IT: more mailbox manipulation:
- rules to delete security warnings or MFA messages
- moving conversations to obscure folders
- marking items as read
- deleting sent items or creating rules to hide evidence.
This allows the attacker to buy time, increasing the chance of successful fraud. It’s also why it’s so important that you review rules/forwarding/delegates post-incident, rather than just reset passwords.
8) Optional Escalation (Admin Roles or Broader Compromise)
Not every phish goes here, but when it does, it gets expensive.
What It Looks Like
- To leadership: multiple accounts affected, operational disruption, possibly ransomware or major data loss.
- To IT: indicators like:
- attempts to access admin portals
- privileged role changes
- multiple user accounts showing similar sign-in anomalies
- signs of lateral movement or broader data access.
If attackers reach admin-level access or compromise multiple accounts, the blast radius multiplies quickly. And here’s where good monitoring is important, which means going beyond viewing events in isolation but correlating them. This is where correlating events rather than viewing them in isolation makes the difference between simply monitoring and good monitoring.
The M365 Signals That Matter (What To Monitor First)
If you see any of the below, it should ring alarms bells.
Investigate-Now Signals
- New/increased external auto-forwarding
- New inbox rules that hide or reroute finance/security emails
- New delegate access / mailbox permissions
- Unusual mass downloads from SharePoint/OneDrive (if visible)
- New OAuth app consent with high-impact permissions
- Multiple failed sign-ins then success (spray pattern)
- Sign-in from new location/device immediately followed by high-volume email actions
- New admin role assignments (rare, high impact)
- Conditional Access or security policy changes (if applicable)
- Unusual sending patterns (new recipients, unusual volume)
And this is especially relevant if you also see any activity like the below.
Correlate Signals
- Out-of-hours activity spikes
- New email client/app type (legacy protocols, unusual user agent)
- Sudden change in geolocation profile
- Unusual creation of rules across multiple users (campaign indicator)
Mailbox Rules, Forwarding, and “Invisible” Persistence
Looking at how it’s done, it should become clear WHY BEC is so successful.
Attackers love mailbox persistence because it’s:
- Low noise: No obvious pop-ups, no crashed systems, no ransomware note. It looks like normal email usage.
- High leverage: One compromised mailbox can influence invoices, supplier conversations, approvals, and internal trust.
- Self-hiding: Rules can automatically remove warning signs (supplier replies, security notifications, MFA alerts) so the victim doesn’t realise anything is wrong.
- Durable: If the attacker sets up forwarding, delegates, or OAuth access, they can often stay in control even after a password change.
The key idea: they don’t need to hack again if they can keep access quietly.
Common Malicious Mailbox Rule Patterns (What They Do and Why)
Mailbox rules are perfect for BEC because they can manipulate conversations automatically.
1) Move Emails to Deleted Items / RSS / Archive
What it achieves
- Hides replies from real suppliers or colleagues that would expose the fraud.
- Prevents the user from seeing warnings like “this looks suspicious”.
What it looks like in practice
- Supplier says, “We replied yesterday”, but the user never saw it.
- The inbox looks oddly quiet during an active invoice conversation.
2) Mark As Read, Auto-Delete, or Redirect Replies
What it achieves
- The user stops noticing new emails.
- The attacker can keep a conversation going without the user seeing the real thread.
Common variants
- “If subject contains ‘invoice’ then mark as read + move to Archive”
- “If sender is Accounts Payable then delete”
- “If the email is a reply to my sent message, move it away”
3) Keyword Targeting (Invoice, Payment, Bank Details, Remittance, IBAN)
What it achieves
- Lets the attacker focus only on money-related conversations while leaving everything else normal.
- Makes detection harder because overall email behaviour doesn’t change much.
Typical keyword sets
- invoice, inv, remittance, payment, bank, account details, sort code, IBAN, BACS, SWIFT, transfer, urgent, statement, PO number
This is why BEC often hits finance teams: the attacker is filtering formoney-related words and hijacking only those threads.
Forwarding Patterns (Quiet Exfiltration and Control)
Forwarding is both data theft and operational advantage.
1. External Forwarding Enabled
Turns your mailbox into a live feed for the attacker by
- Copying inbound emails to an attacker-controlled address so they can operate even if they lose interactive access later.
- Giving them full visibility into supplier communications, approvals, and internal threads.
2. Forwarding to Lookalike Addresses
Avoids suspicion by using an address that looks legitimate at a glance and is how attackers keep up with the conversation, and time their fraud attempts perfectly.
Examples
- supplier-payments@... instead of supplierpayments@...
- ceo.name@... with subtle typos, extra characters, or different domains
- a compromised third-party Gmail/Outlook account that seems “normal”
Delegate / Permission Abuse (How Attackers “Become You” Properly)
If rules and forwarding are “hiding”, delegation is “control”.
“Send As”
- The attacker can send email as the user, from the real mailbox identity.
- Replies look authentic because they come from the genuine address.
“Send on Behalf”
- Still convincing: “X on behalf of Y” is easy for colleagues to miss in a busy thread.
- Useful for internal fraud attempts.
Mailbox Access Delegation (Full Access)
- Lets the attacker read, search, and manage the mailbox without needing to phish again.
- Often used to keep access while the victim continues working normally.
Delegation changes can be the difference between a one-off llogin and a sustained fraud operation.
What To Monitor and Alert On (High-Signal Events)
While we’ve established what is important to keep an eye on– if you see any of the below being changed, it’s time to trigger action.
1) Creation or Modification of Inbox Rules
Alert on:
- New rules created
- Rules edited (especially around finance keywords)
- Rules that move/delete/mark as read
- Rules that forward or redirect
Priority:
Rules involving deletion, redirection, or external addresses are almost always high risk.
2) Enabling Forwarding (Especially External)
Alert on:
- Mailbox forwarding enabled
- New external forwarding addresses
- Transport/mail flow changes allowing forwarding (where relevant)
3) Permission and Delegate Changes
Alert on:
- Any new “Send As” or “Send on behalf”
- New Full Access delegates
- Admin role changes tied to messaging or identity
- Changes made out of hours or from unusual sign-in contexts (and that’s exactly why 24/7 monitoring is so important)
4) Correlation Triggers (Strongest Detection)
Treat as urgent when you see combinations like:
- New sign-in context AND new inbox rule created
- Risky sign-in AND forwarding enabled
- New OAuth consent AND sudden mailbox activity spike
- New delegate AND emails sent to new external recipients
Quick Guidance: Suspicious vs Confirmed Compromise
Treat as confirmed compromise (act immediately) if you see:
- Any external forwarding set that wasn’t approved
- Any rule that deletes or hides finance/security-related emails
- Any new delegate permission (Send As/Full Access) that wasn’t requested
- Any OAuth consent granting high-impact mail/file access that the user can’t explain
- Any of the above plus an unusual sign-in (new location/device/time)
Response posture: contain first, investigate second.
Treat as suspicious activity (investigate quickly) if you see:
- A new rule that looks benign but is created at an unusual time
- Minor rule changes by a user with a recent unusual sign-in
- Small anomalies that don’t involve forwarding/delegation/deletion yet
Response posture: investigate immediately. If youcan’t explain it quickly, assume compromise.
Entra ID Sign-In Risk: What Is “Abnormal”?
With Entra ID at your disposal, you can reliably monitor for the following abnormal pattern in practice:
Location: it’s impossible for the user to travel to/it’s unfamiliar for that user
Sign-in time/device/client: the user signs in at anunusual time from a new device from a new app/client
Repeated MFA prompts: a user is either really notpaying attention or more likely, a hacker is trying to trick an employee toconfirm the prompt to make the notifications stop
Admin portals/security settings: sign in immediately after first access
High-risk accounts:
- executives, finance, payroll, admins
What’s your baseline?
- known locations/devices
- typical apps
- normal working hours (roughly)
What should automatically trigger alerts?
- risky sign-in + mailbox rule creation
- risky sign-in + forwarding enabled
- risky sign-in + new OAuth consent
While monitoring helps, taking action immediately reduces the chance of success.
Quick Wins: Policies and Controls That We Often See Underused
High impact, low effort (examples)
- Block or restrict legacy authentication
- Enforce MFA and tighten for admins and high-risk users
- Turn on/confirm anti-phishing and impersonation protection (executive/finance)
- Restrict external auto-forwarding
- Review and tighten app consent (move toward admin consent for risky permissions)
- Ensure mailbox auditing and log retention are adequate
- Create an easy report phishing path for users
Medium effort, strong payoff
- Conditional Access for device compliance/approved apps
- Separate admin accounts + break-glass plan
- Alerting and escalation path (including out-of-hours)
What To Do When You Suspect Compromise (First 30 Minutes)
First 5 Minutes: Contain
1. Confirm affected user and urgency (fraud risk?)
2. Block sign-in / reset credentials (as per policy)
3. Revoke active sessions
4. Escalate internally if finance/executive account
Next 10 Minutes: Check Persistence
5. Review inbox rules
6. Check forwarding settings
7. Check delegates/mailbox permissions
8. Check new OAuth consents/apps (if in scope)
Next 15 Minutes: Scope and Protect Others
9. Identify external recipients and suspicious sent items
10. Look for similar patterns across other accounts (campaign indicator)
11. Increase monitoring for high-risk users
12. Document actions/evidence for audit/insurance
Mind: The goal is to stop spread and fraud – forensics come later.
In a Nutshell
AI has changed phishing in one fundamental way: it has made it reliably convincing. That means the old model, train users harder and hope they spot the signs, will keep failing. In Microsoft 365 environments, the real differentiator is what happens after the click: how quickly you spot abnormal sign-ins, how quickly you catch persistence being set (rules, forwarding, delegates, OAuth consent), and how quickly you contain before fraud or wider compromise follows. If you’re monitoring the right signals and you’ve agreed the first 30 minutes of actions in advance, most takeover attempts can be contained before they turn into a payment redirection, data loss, or a broader incident.
If you want a practical starting point, use our Microsoft365 AI-Phishing & BEC Defence Kit to validate your tenant basics, run a quick persistence audit, and align IT and finance on a payment-verification process.