Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft 365 Direct Send Abused for Phishing

Posted on June 27, 2025June 27, 2025 By CWS

Microsoft 365 Direct Ship has been abused in a phishing marketing campaign to ship spoofed messages that seem to originate from throughout the sufferer’s group, Varonis warns.

An Alternate On-line function, Direct Ship permits purposes and units to ship emails throughout the tenant. It depends on a sensible host and doesn’t require authentication for e mail technology.

Based on Varonis, menace actors have found a strategy to abuse the function’s lack of authentication to ship spoofed emails that bypass safety controls, all with out having to compromise an account throughout the goal group.

As a result of good host addresses observe a predictable sample, the attacker solely must determine the group’s area and a sound recipient, after which abuse the Direct Ship setup to ship phishing emails, “with out ever logging in or touching the tenant”, Varonis says.

Within the phishing marketing campaign noticed by the cybersecurity agency, as a result of the good hosts had been accepting emails from exterior sources, menace actors had been seen using PowerShell to ship the spoofed emails.

“As a result of the e-mail is routed by Microsoft’s infrastructure and seems to originate from throughout the tenant, it could actually bypass conventional e mail safety controls,” Varonis notes.

In a single case, the emails resembled voicemail notifications and carried a PDF attachment that contained a QR code directing the recipients to a Microsoft 365 phishing web page.

“The e-mail originated from an exterior IP, failed SPF and DMARC checks, and lacked DKIM signatures, but it was accepted and delivered internally through the good host. It is a textbook instance of how Direct Ship may be exploited when left unprotected,” the corporate notes.Commercial. Scroll to proceed studying.

To stop such assaults, organizations are suggested to allow the Reject Direct Ship possibility within the Alternate admin heart, to implement strict DMARC insurance policies and e mail safety controls, and to coach staff on phishing and the chance of QR code attachments.

Imposing multi-factor authentication (MFA) and a static IP handle within the SPF file must also scale back the chance related to this abuse.

To determine Direct Ship abuse, organizations ought to look in message headers for exterior IPs despatched to the good host, analyze SPF, DKIM, and DMARC failures, and seek for a sensible host within the SPF file.

Associated: Cloudflare Tunnels Abused in New Malware Marketing campaign

Associated: Russian Hackers Bypass Gmail MFA With App-Particular Password Ruse

Associated: Google Warns of Vishing, Extortion Marketing campaign Concentrating on Salesforce Clients

Associated: Taming the Hacker Storm: Why Hundreds of thousands in Cybersecurity Spending Isn’t Sufficient

Security Week News Tags:Abused, Direct, Microsoft, Phishing, Send

Post navigation

Previous Post: MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted
Next Post: Vulnerability Exposed All Open VSX Repositories to Takeover

Related Posts

Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack Security Week News
Organizations Warned of Exploited PaperCut Flaw Security Week News
Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims Security Week News
Man Who Hacked Organizations to Advertise Security Services Pleads Guilty Security Week News
Canadian Electric Utility Lists Customer Information Stolen by Hackers Security Week News
Penn and Phoenix Universities Disclose Data Breach After Oracle Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark