Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploiting .onmicrosoft.com Domains to Launch TOAD Scam Attack

Hackers Exploiting .onmicrosoft.com Domains to Launch TOAD Scam Attack

Posted on December 22, 2025December 22, 2025 By CWS

Cybercriminals are more and more weaponizing professional Microsoft infrastructure to bypass safety filters and trick customers into falling for Phone-Oriented Assault Supply (TOAD) scams.

By abusing the default .onmicrosoft.com When domains are assigned to Azure tenants, attackers ship malicious invitations that seem to originate from trusted Microsoft addresses.

The assault vector is deceptively easy but extremely efficient. An attacker units up a managed tenant and sends Microsoft Invitations to potential victims.

Jay Kerai noticed that risk actors, fairly than counting on a malicious attachment, fill the “Message” subject of the invite with social-engineering lures. These messages usually urge the recipient to name a fraudulent assist quantity to resolve a billing challenge or verify a subscription.

Abuse of.onmicrosoft[.]com (Img Supply: Jay Kerai)

As a result of these invitations are routed via professional Microsoft infrastructure, they possess a excessive area repute. This permits them to bypass many commonplace e-mail gateways that will immediately flag the same message coming from an unknown server.

Whereas Microsoft Defender for Workplace 365 (MDO) usually flags these makes an attempt as high-confidence phishing, relying solely on automated detection is dangerous. Moreover, safety groups trying to mitigate this by configuring Entra Exterior Id to limit B2B entry will discover the measure ineffective in opposition to this particular method.

The assault doesn’t require the sufferer to simply accept the invite or authenticate; the malicious payload is delivered visibly within the physique of the e-mail notification itself. As soon as the e-mail lands within the inbox, the harm is finished.

To neutralize this risk, safety directors are suggested to configure a selected Change Transport Rule. Nonetheless, merely blocking the area will not be possible, as it will disrupt professional administrative site visitors.

As a substitute, directors should use Common Expressions (Regex) to focus on the precise sample utilized in these assaults with out blocking admins on a Microsoft On-line E-mail Routing Handle (MOERA).

Safety researchers advocate making use of the next Regex to examine the message physique:

textDomain:s+([A-Za-z0-9]+).onmicrosoft.com

Implementing this rule requires warning. Some professional contractors or small distributors working their very own tenants could not have configured a {custom} major area, relying as a substitute on the default .onmicrosoft.com tackle.

Safety groups ought to audit their site visitors previous to enforcement. If professional companions are detected utilizing the default area, organizations might want to whitelist these particular senders or request that the contractors replace their major area to a custom-branded one to make sure uninterrupted communication.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:.onmicrosoft.com, Attack, Domains, Exploiting, Hackers, Launch, Scam, TOAD

Post navigation

Previous Post: Gambit Cyber Raises $3.4 Million in Seed Funding
Next Post: New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs

Related Posts

India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms Cyber Security News
17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released 17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released Cyber Security News
12 Malicious Extension in VSCode Marketplace Steal Source Code and Exfiltrate Login Credentials 12 Malicious Extension in VSCode Marketplace Steal Source Code and Exfiltrate Login Credentials Cyber Security News
Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In The Wild Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In The Wild Cyber Security News
Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances Cyber Security News
Chrome Zero-Day Vulnerabilities Exploited in 2025 Chrome Zero-Day Vulnerabilities Exploited in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical RCE Flaw in n8n Poses Security Threat
  • Critical Flaw in WatchGuard VPN Client Allows System-Level Attacks
  • AISURU Botnet Orchestrates Unprecedented 31.4 Tbps DDoS Attack
  • Critical SolarWinds Vulnerability Exposes 170 Installations
  • SystemBC Botnet Survives Takedown, Infects 10,000 Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical RCE Flaw in n8n Poses Security Threat
  • Critical Flaw in WatchGuard VPN Client Allows System-Level Attacks
  • AISURU Botnet Orchestrates Unprecedented 31.4 Tbps DDoS Attack
  • Critical SolarWinds Vulnerability Exposes 170 Installations
  • SystemBC Botnet Survives Takedown, Infects 10,000 Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark