Not all threats come from malware—some come from legitimate apps. Traitorware - a type of Rogue Apps - is what we call OAuth application abuse in Microsoft 365. Attackers exploit real, trusted apps—like EM Client—to gain persistent access to inboxes, siphon data, and evade detection. Once an attacker secures initial access, they can delegate permissions, gain full mailbox control, and even bypass MFA protections - all without triggering alarms. But with Huntress Managed ITDR (Identity Threat Detection & Response), now powered by Rogue Apps, we hunt down and shut off unauthorized access before it spreads.