Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks

Posted on November 17, 2025November 17, 2025 By CWS

A brand new phishing marketing campaign has emerged that weaponizes Microsoft Entra visitor consumer invites to deceive recipients into making telephone calls to attackers posing as Microsoft assist.

The assault leverages a important safety hole in how Microsoft Entra communicates with exterior customers, turning a official collaboration characteristic right into a supply mechanism for classy social engineering assaults.

This marketing campaign represents an evolution in TOAD (Phone Oriented Assault Supply) techniques, combining cloud-based credential methods with conventional phone-based scams to compromise organizational safety.

Michael Taggart, a safety analyst and researcher, recognized this novel assault vector after discovering a number of phishing campaigns exploiting the visitor invitation system.

The malware marketing campaign makes use of Microsoft Entra tenant invites despatched from the official invitations@microsoft[.]com handle to bypass e-mail filters and set up belief with targets.

Attackers register faux organizational tenants with names like “Unified Workspace Crew,” “CloudSync,” and “Superior Suite Providers” to impersonate official Microsoft entities.

The assault chain demonstrates subtle coordination between cloud infrastructure abuse and social engineering.

As soon as recipients obtain the invitation e-mail, they encounter a convincing message claiming their Microsoft 365 annual plan requires renewal processing, full with fabricated transaction particulars together with reference numbers, buyer IDs, and billing quantities of roughly $446.46.

The message instructs customers to contact a telephone quantity listed as Microsoft Billing Help, which really connects them on to attackers who proceed with credential harvesting and account takeover makes an attempt.

Detection Evasion Via Reputable Infrastructure

The an infection mechanism exploits a elementary weak point in Entra’s design: the Message area in visitor consumer invites accepts arbitrarily lengthy textual content, permitting attackers to embed intensive phishing content material with out triggering conventional safety alerts.

Entra Visitor consumer invites (Supply – Taggart-Tech)

For the reason that invitation originates from Microsoft’s official infrastructure, e-mail safety methods not often flag these communications as malicious.

The attackers register a number of faux tenant domains, together with x44xfqf.onmicrosoft[.]com, woodedlif.onmicrosoft[.]com, and xeyi1ba.onmicrosoft[.]com, making a community of persistent infrastructure for steady marketing campaign deployment.

Organizations ought to implement rapid detection measures by looking e-mail logs for indicators, together with the sender handle invitations@microsoft[.]com, topic line key phrases like “invited you to entry purposes inside their group,” and recognized attacker tenant names.

Community directors can block the telephone numbers related to these campaigns whereas educating customers about verifying Microsoft communications by official assist channels somewhat than responding to invitation-based requests.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, Entra, Hackers, Invitations, Launch, Leverages, Microsoft, Tenant, TOAD

Post navigation

Previous Post: CISA Warns of Fortinet FortiWeb WAF Vulnerability Exploited in the Wild to Gain Admin Access
Next Post: TaskHound Tool – Detects Windows Scheduled Tasks Running with Elevated Privileges and Stored Credentials

Related Posts

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture Cyber Security News
251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points Cyber Security News
“GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload Cyber Security News
Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table Cyber Security News
Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security Cyber Security News
New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark