Check Your Gmail for
Silent Forwarding Rules
Silent email forwarding is the #1 technique in Business Email Compromise attacks. An attacker gains access to your Gmail account and adds a forwarding rule — your inbox looks normal, but every email you receive is being copied to them. Here is how to check in under 2 minutes.
Gmail Forwarding Rules Checklist
Follow these steps in order. Each takes under 30 seconds. This must be done on a desktop browser — the Gmail mobile app does not expose forwarding settings.
Open Gmail on desktop (mobile app does not show forwarding settings). Click the gear icon in the top-right corner, then click "See all settings."
Gmail → Gear icon → See all settingsClick the "Forwarding and POP/IMAP" tab — it is the fourth tab across the settings page header.
Settings → Forwarding and POP/IMAPLook at the Forwarding section at the top. If it shows a forwarding address you do not recognize, this is a critical red flag. Note the full email address.
Forwarding section → Any address listedGo to the "Filters and Blocked Addresses" tab (fifth tab). Scroll through every filter and look for any filter action that says "Forward to." Attackers prefer filter-based forwarding because it only copies high-value emails.
Settings → Filters and Blocked AddressesVisit myaccount.google.com/security and check "Recent security activity" for unfamiliar logins. If forwarding rules were added by an attacker, you should also see unauthorized login events.
myaccount.google.com → Security → Recent activityRed Flags to Watch For
Not all forwarding rules are malicious — you may have set up legitimate auto-forwarding yourself. These are the specific patterns that indicate unauthorized access.
Forwarding to a freemail provider you do not control
CriticalA forwarding rule pointing to a Gmail, Hotmail, Yahoo, or ProtonMail address you did not create is the primary BEC indicator. Legitimate auto-forwarding goes to corporate systems, not free consumer accounts.
Forwarding address you have no memory of adding
CriticalEven if the address looks legitimate, if you have no memory of setting it up, treat it as unauthorized. Check your Google account security log for when the setting was changed.
Multiple forwarding rules covering different criteria
HighAttackers sometimes create redundant rules to ensure they keep receiving copies even if one rule is discovered and deleted. Two or more forwarding rules is unusual for most users.
Filters targeting financial keywords
HighFilter-based forwarding on terms like "invoice," "payment," "wire transfer," "bank," or supplier names indicates targeted BEC reconnaissance — the attacker wants financial data specifically.
Forwarding rule added recently (check security log)
MediumA forwarding rule added in the last 30–90 days that you do not recognize corresponds with when attackers typically gain access. Cross-reference with your security activity log for the creation date.
If You Find an Unauthorized Forwarding Rule
Act immediately. If an attacker added a forwarding rule, they still have — or had — access to your account. Speed matters: every day the rule runs, more of your email is compromised.
- 1Delete the forwarding rule (Settings → Forwarding and POP/IMAP → remove address) and any suspicious filters.
- 2Change your Google account password immediately at myaccount.google.com/security.
- 3Enable 2-Step Verification using an authenticator app or hardware key — not SMS.
- 4Sign out all other sessions: myaccount.google.com/security → Your devices.
- 5Revoke suspicious third-party app permissions at myaccount.google.com/permissions.
- 6If financial communications were exposed, notify your bank, clients, or IT security team.
Scan My Inbox for BEC Signals
Beyond forwarding rules, Gorganizer scans your Gmail inbox for BEC indicators: lookalike sender domains, reply-to injection, impersonation patterns, and 1,751+ other threat signals.
Scan My Inbox for BEC Signals →Free scan · $4.99 one-time cleanup · No subscription required
Frequently Asked Questions
What is silent email forwarding and why is it dangerous?+
Silent email forwarding is when an attacker adds a Gmail forwarding rule after compromising your account, sending a copy of every incoming email to an address they control. You continue receiving mail normally. The attacker silently monitors your inbox for weeks before striking with fraudulent wire transfers or impersonation. The FBI IC3 reported $2.9 billion in BEC losses in 2024.
How do I check Gmail forwarding settings?+
Open Gmail on desktop. Click the gear icon then "See all settings." Click "Forwarding and POP/IMAP." Any listed address you do not recognize was added without your authorization. Also check Settings → Filters and Blocked Addresses for filters with "Forward to" actions.
Is filter-based forwarding more dangerous than account-level forwarding?+
Both are dangerous, but filter-based forwarding is harder to detect. It only copies specific emails — for example, those containing "invoice" or "wire transfer" — so most of your inbox is unaffected and you are less likely to notice. Account-level forwarding copies everything but is easier to find in settings.