ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: AF027
  • Created: 11th August 2025
  • Updated: 11th August 2025
  • Contributor: The ITM Team

Clear Email Artifacts

A subject clears email artifacts to hide evidence of their activities, such as deleting emails, auto-forwarding rules, or other mailbox rules.

Subsections

ID Name Description
AF027.002Auto-Forwarding Rule Deletion

The subject removes one or more auto-forwarding rules from their email configuration to obscure prior message redirection to internal or external recipients. These rules, when active, silently transmit inbound emails, including attachments, proprietary data, or sensitive internal correspondence, to alternate mailboxes, often controlled or accessible by the subject. Deletion is typically performed to disrupt investigative reconstruction, eliminate configuration evidence, and frustrate detection of unauthorized forwarding behavior.

AF027.001Email Deletion

The subject deliberately deletes emails - either sent, received, or both - with the intent to obstruct investigative visibility, remove evidence of policy violations, or eliminate traces of communication relevant to an insider event. While routine inbox maintenance is common, patterns of targeted deletion may indicate purposeful concealment.

AF027.003Inbox Rule Deletion

The subject deletes one or more inbox rules from their email client or server mailbox configuration to conceal the prior existence of automated message handling behaviors. Unlike auto-forwarding rules, which redirect messages externally, inbox rules typically perform local actions such as moving messages to folders, deleting them upon receipt, or marking them as read.

 

Deleted rules can complicate retrospective investigations by eliminating a clear audit trail of how emails were processed, hidden, or discarded during an investigation's timeframe.

AF027.006Shared Mailbox Deletion

A subject intentionally deletes a shared mailbox that has been used for illegitimate activity - such as Exfiltration via Corporate Email, distribution of unsolicited bulk messages, or staging of sensitive data - with the purpose of denying access to investigators.