Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New Zero-Click Attack Lets ChatGPT User Steal Data

January 8, 2026

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 

January 8, 2026

GoBruteforcer Botnet Targets Linux Servers

January 8, 2026
Facebook X (Twitter) Instagram
Thursday, January 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Phishing attacks exploit misconfigured emails to target Microsoft 365
News

Phishing attacks exploit misconfigured emails to target Microsoft 365

Team-CWDBy Team-CWDJanuary 8, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A surge in phishing attacks which exploit email routing settings and misconfigured domain spoofing protections to spoof domains and make malicious emails appear as if they were sent from within the organization are targeting Microsoft 365 accounts.

Microsoft Threat Intelligence has warned that the attacks are themed around phoney messages from HR departments and IT security teams and are being deployed in attempts to steal login credentials.

While the attack vector isn’t new, Microsoft said there’s been a significant rise in attacks deploying these techniques since May 2025 and they’re commonly used in conjunction with phishing-as-a-service kits like Typhoon2FA.

These phishing emails have been sent to a wide range of organizations across many different industries, leading researchers to conclude that they’re opportunistic in nature rather than targeted, but that doesn’t make them less of a threat.

In fact, because the emails look like they’ve been sent from within the organization, “phishing messages sent through this vector may be more effective,” said Microsoft.

The company also noted that the spoofing attacks only affect organizations which have custom configured a complex routing scenario where the Microsoft Mail Exchange (MX) records are not pointed to Office 365, with spoofing protections which have not been properly configured.

What makes these campaigns particularly risky is how the attackers can make the emails look like they’ve come from within the same organization as the intended target, using the company’s domain in the ‘To’ and ‘From’ fields.

According to Microsoft, this is possible because the tenant organization has misconfigured their MX records, so they’re not pointed directly at Microsoft 365 – which means that Microsoft’s spoof detection and email filtering tools aren’t turned on by default. Tenants with MX records which point directly to Office 365 are not vulnerable to this attack vector.

These authentication failures mean that attackers can exploit the permissive nature of the mail server, enabling malicious messages to masquerade as coming from within an organization.

Stolen passwords, CEO fraud and more

Examples of phishing messages sent as part of these campaigns include messages requiring documents to be signed, emails claiming that passwords need to be updated – taking the user to a phony login portal which attackers use to steal credentials – or even fake invoices claiming to be from the company CEO requesting payments of thousands of dollars be made for purchases.  

The spoofing of internal domains means the target is more likely to believe the message really does come from one of their colleagues.

“Successful credential compromise through phishing attacks may lead to data theft or business email compromise (BEC) attacks against the affected organization or partners and may require extensive remediation efforts, and/or lead to loss of funds in the case of financial scams,” Microsoft warned.

The company suggested that MX servers should be correctly configured to point directly to Office 365 servers, so they are not vulnerable to this method of domain spoofing.

It’s also recommended that companies apply strict domain-based message authentication, reporting, and conformance (DMARC) rules to help prevent domain spoofing, as well as ensuring any third-party services linked to MX are configured correctly. Multi-factor authentication (MFA) is also suggested to help prevent account takeover.

“Microsoft recommends enforcing phishing-resistant MFA for privileged roles in Microsoft Entra ID to significantly reduce the risk of account compromise.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
Next Article What it is and how to protect yourself
Team-CWD
  • Website

Related Posts

News

New Zero-Click Attack Lets ChatGPT User Steal Data

January 8, 2026
News

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 

January 8, 2026
News

Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act

January 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How to help older family members avoid scams

October 31, 2025

What it is and how to protect yourself

January 8, 2026

How the always-on generation can level up their cybersecurity game

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.