Topics Map > Features and Functionality > Client Capabilities > Web (OWA)
Microsoft 365 - List/Newsletter Web Form Attacks and How to Protect your Microsoft 365 Account
First, be vigilant for other malicious activity in your email or with your NetID account. List bomb attacks are sometimes used to mask other activity. For example you might be so busy dealing with the flood of email that you don't notice an account change notification.
Next, do not use the Report Suspicious Outlook add-in to submit the newsletter and web signup as suspicious. The Report Suspicious processing explores links in the submitted messages and may result in confirmation that you want to receive further communications from the website.
Finally, you may be able to mitigate the attack by creating an inbox rule to filter the messages to a separate folder or delete them entirely.
-
Create an Inbox rule in Outlook on the web with the following settings:
-
Message header includes: List-Unsubscribe, List-Id:, LIST_HEADER
-
Move to: a folder of your choice for further review or deletion.
- Recipient address includes: feel free to include campus address domains @lists.wisc.edu and @g-groups.wisc.edu in your exceptions so that WiscList and Google Groups messages don't get diverted by this Inbox rule. Add any other domains or specific email addresses you don't want affected by the rule, as well.
-
-
Click Save
See Also
- Microsoft 365 - Recommended tools to manage Inbox
- Microsoft 365 - Learn about junk email and phishing
- Microsoft 365 (Outlook for Windows) - Overview of the Junk Email Filter
- Microsoft 365 (Outlook for Mac) - About junk e-mail protection
- Microsoft 365 - Why am I getting bounced messages for email I didn't send?