| Attribute | Details | |—|—| | Technique ID | COLLECT-EMAIL-002 | | MITRE ATT&CK v18.1 | Local Email Collection (T1114.001) | | Tactic | Collection | | Platforms | Windows endpoint with Outlook (M365 Apps / Outlook 2013+), M365 backend mailbox | | Severity | High | | Technique Status | ACTIVE (local PST export fully supported; detection and controls vary) | | Last Verified | 2024-09-30 | | Affected Versions | Outlook 2013, 2016, 2019, Microsoft 365 Apps on Windows 10/11; Exchange Online / on‑prem Exchange as mailbox source | | Patched In | N/A – feature working as designed; risk mitigated via DLP, rights management, and endpoint controls | | Environment | M365 | | Author | SERVTEP – Artur Pchelnikau |
.pst or secondary data files. Adversaries with access to a workstation profile configured for a target mailbox can use Outlook’s Import/Export wizard, manual PST creation, or scripted approaches to export all or selected folders. The resulting PST or OST files can then be staged and exfiltrated, representing classic local email collection under T1114.001..ost and .pst), local profile directories, removable media, and user‑initiated exports via the Outlook GUI or add‑ins. On‑prem or cloud mailboxes are equally exposed once synchronized locally.| Framework | Control / ID | Description | |—|—|—| | CIS Benchmark | CIS Microsoft 365 / Windows Endpoint Hardening | Failure to control PST export and removable storage allows uncontrolled copies of regulated communications. | | DISA STIG | MS Outlook / Windows 10 STIG – removable media, data at rest | Weak control of local mail stores and USB usage conflicts with DoD data handling requirements. | | CISA SCuBA | Endpoint & SaaS data exfiltration safeguards | Lack of DLP and EDR around PST/OST files undermines secure baseline guidance. | | NIST 800-53 | AC-3, MP-5, SC-28 | Inadequate access control and media protection for local email archives. | | GDPR | Art. 5, Art. 32 | Exporting full mailboxes to unmanaged PSTs breaches data minimization and security of processing. | | DORA | Art. 9 | Uncontrolled export of regulated communications violates ICT security and monitoring obligations. | | NIS2 | Art. 21 | Lack of technical and organizational measures to control offline copies of critical communications. | | ISO 27001 | A.5, A.8.12, A.8.14, A.8.16 | Missing controls for removable media, local storage of sensitive information and endpoint hardening. | | ISO 27005 | Insider data exfiltration via local email archives | High‑impact insider threat scenario requiring explicit treatment.
Supported Versions:
Exchange: Exchange Online, Exchange 2013–2019.
.pst / .ost files directly.# List Outlook data files for current user
$paths = @(
"$env:USERPROFILE\Documents\Outlook Files",
"$env:LOCALAPPDATA\Microsoft\Outlook"
)
Get-ChildItem -Path $paths -Filter *.pst -Recurse -ErrorAction SilentlyContinue |
Select-Object FullName, Length, LastWriteTime
Get-ChildItem -Path $paths -Filter *.ost -Recurse -ErrorAction SilentlyContinue |
Select-Object FullName, Length, LastWriteTime
What to Look For:
.pst or .ost files (hundreds of MB or GB) indicating full mailbox caches.Version Note:
# From a Linux host with access to user profile shares
find /mnt/usershares -iname "*.pst" -o -iname "*.ost" -size +100M
What to Look For:
Supported Versions: Outlook 2013–2019, Microsoft 365 Apps.
Objective: Start the Outlook Import/Export wizard.
Command / Actions:
Expected Output:
What This Means:
Objective: Export entire mailbox (or selected folders) into PST.
Actions:
C:\Users\Public\Exports\user_mailbox.pst).Expected Output:
OpSec & Evasion:
Troubleshooting:
.ost / .pst copying.References & Proofs:
Supported Versions: All Outlook on Windows with cached mode.
Objective: Locate mailbox cache and archive files on disk.
Command:
$paths = @(
"$env:USERPROFILE\Documents\Outlook Files",
"$env:LOCALAPPDATA\Microsoft\Outlook"
)
Get-ChildItem -Path $paths -Include *.pst,*.ost -Recurse -ErrorAction SilentlyContinue
Objective: Stage files for exfiltration.
Command:
$src = "$env:LOCALAPPDATA\Microsoft\Outlook"
$dst = 'C:\Temp\OutlookDump'
New-Item -ItemType Directory -Path $dst -Force | Out-Null
Copy-Item -Path (Join-Path $src '*.ost') -Destination $dst -Force
Compress-Archive -Path "$dst\*" -DestinationPath 'C:\Temp\mailbackup.zip' -Force
Expected Output:
mailbackup.zip containing entire local mailbox cache.OpSec & Evasion:
Troubleshooting:
References & Proofs:
.pst / .ost and creates an archive to emulate collection.Invoke-AtomicTest T1114.001 -TestNumbers 1
Invoke-AtomicTest T1114.001 -TestNumbers 1 -Cleanup
Supported Platforms: Outlook on Windows.
Usage:
Get-ChildItem "$env:USERPROFILE" -Include *.pst,*.ost -Recurse -ErrorAction SilentlyContinue `
| Sort-Object Length -Descending `
| Select-Object -First 20 FullName, Length
Rule Configuration:
Image, TargetFilename, ProcessGuid, User.SPL Query (Sysmon example):
index=endpoint sourcetype=sysmon (TargetFilename="*.pst" OR TargetFilename="*.ost")
| stats latest(_time) AS last_seen, values(Image) AS processes, values(User) AS users, sum(FileSize) AS total_bytes BY TargetFilename
| where total_bytes > 500000000
Rule Configuration:
DeviceFileEvents.FileName, FolderPath, FileSize, InitiatingProcessFileName.KQL Query:
DeviceFileEvents
| where FileName endswith '.pst' or FileName endswith '.ost'
| summarize TotalSize = max(FileSize),
Processes = make_set(InitiatingProcessFileName),
Hosts = make_set(DeviceName)
by FileName, FolderPath, bin(Timestamp, 1h)
| where TotalSize > 500000000
<RuleGroup name="PST Creation" groupRelation="or">
<FileCreate onmatch="include">
<TargetFilename condition="ends with">.pst</TargetFilename>
<TargetFilename condition="contains">Outlook Files</TargetFilename>
</FileCreate>
</RuleGroup>
| Step | Phase | Technique | Description |
|---|---|---|---|
| 1 | Initial Access | Compromised workstation/profile | Attacker gains interactive access. |
| 2 | Collection | COLLECT-EMAIL-002 – Outlook Mailbox Export | Local PST/OST export. |
| 3 | Exfiltration | Data staging and transfer | PST/OST moved to external destination. |