Anti-Forensics
Account Misuse
Browser or System Proxy Configuration
Clear Browser Artifacts
Clear Email Artifacts
Decrease Privileges
Delayed Execution Triggers
Delete User Account
Deletion of Volume Shadow Copy
Disk Wiping
File Deletion
File Encryption
Hide Artifacts
Hiding or Destroying Command History
Log Deletion
Log Modification
Modify Windows Registry
Physical Destruction of Storage Media
Physical Removal of Disk Storage
Steganography
System Shutdown
Timestomping
Tripwires
Uninstalling Software
Virtualization
Windows System Time Modification
- ID: AF027
- Created: 11th August 2025
- Updated: 11th August 2025
- Contributor: The ITM Team
Clear Email Artifacts
A subject clears email artifacts to hide evidence of their activities, such as deleting emails, auto-forwarding rules, or other mailbox rules.
Subsections
ID | Name | Description |
---|---|---|
AF027.002 | Auto-Forwarding Rule Deletion | The subject removes one or more auto-forwarding rules from their email configuration to obscure prior message redirection to internal or external recipients. These rules, when active, silently transmit inbound emails, including attachments, proprietary data, or sensitive internal correspondence, to alternate mailboxes, often controlled or accessible by the subject. Deletion is typically performed to disrupt investigative reconstruction, eliminate configuration evidence, and frustrate detection of unauthorized forwarding behavior. |
AF027.001 | Email Deletion | The subject deliberately deletes emails - either sent, received, or both - with the intent to obstruct investigative visibility, remove evidence of policy violations, or eliminate traces of communication relevant to an insider event. While routine inbox maintenance is common, patterns of targeted deletion may indicate purposeful concealment. |
AF027.003 | Inbox Rule Deletion | The subject deletes one or more inbox rules from their email client or server mailbox configuration to conceal the prior existence of automated message handling behaviors. Unlike auto-forwarding rules, which redirect messages externally, inbox rules typically perform local actions such as moving messages to folders, deleting them upon receipt, or marking them as read.
Deleted rules can complicate retrospective investigations by eliminating a clear audit trail of how emails were processed, hidden, or discarded during an investigation's timeframe. |
AF027.006 | Shared Mailbox Deletion | A subject intentionally deletes a shared mailbox that has been used for illegitimate activity - such as Exfiltration via Corporate Email, distribution of unsolicited bulk messages, or staging of sensitive data - with the purpose of denying access to investigators. |