Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data

Posted on October 24, 2025October 24, 2025 By CWS

Microsoft 365 Trade On-line’s Direct Ship characteristic, initially designed to allow legacy units and functions to ship emails with out authentication, has grow to be an exploitable pathway for cybercriminals conducting refined phishing and enterprise e mail compromise assaults.

The characteristic permits multifunction printers, scanners, and older line-of-business functions to transmit messages by bypassing rigorous authentication and safety checks, creating an operational comfort that adversaries have weaponized to avoid commonplace content material filters and area verification protocols.

Latest investigations reveal a surge in malicious campaigns exploiting Direct Ship to ship fraudulent messages that seem to originate from trusted inside sources.

Menace actors emulate legit system visitors and ship unauthenticated emails impersonating executives, IT assist desks, and inside customers.

These campaigns incessantly make use of business-themed social engineering lures, together with process approvals, voicemail notifications, and cost prompts designed to control recipients into divulging credentials or delicate data.

Cisco Talos analysts recognized elevated exercise by malicious actors leveraging Direct Ship as a part of coordinated phishing campaigns and BEC assaults.

Safety researchers from a number of organizations, together with Varonis, Irregular Safety, Ironscales, Proofpoint, Barracuda, and Mimecast, have independently confirmed related findings, indicating that adversaries have actively focused companies utilizing Direct Ship in current months.

Direct Ship Exploitation

The assaults exploit the characteristic’s means to inherit implicit belief from Trade infrastructure, reducing payload scrutiny and enabling messages to bypass essential sender verification mechanisms.

The exploitation approach facilities on circumventing three basic e mail authentication protocols: DomainKeys-Recognized Mail (DKIM), Sender Coverage Framework (SPF), and Area-based Message Authentication, Reporting and Conformance (DMARC).

Spoofed American Specific dispute (left), faux ACH cost discover (proper) (Supply – Cisco Talos)

Underneath regular circumstances, these protocols confirm message authenticity by cryptographic signatures, licensed IP ranges, and coverage enforcement.

Nevertheless, Direct Ship prevents this inspection, permitting spoofed messages to succeed in recipients unchallenged.

Attackers have embedded QR codes inside PDFs and crafted empty-body messages with obfuscated attachments, efficiently evading conventional content material filters and directing victims to credential harvesting pages.

Microsoft has responded by introducing a Public Preview of the RejectDirectSend management and saying future enhancements, together with Direct Ship-specific utilization studies and a default-off configuration for brand new tenants.

Organizations can mitigate dangers by disabling Direct Ship the place possible utilizing the command Set-OrganizationConfig -RejectDirectSend $true after validating legit mail flows, migrating units to authenticated SMTP submission on port 587, and implementing tightly scoped IP restrictions for units unable to authenticate correctly.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Abuse, Bypass, Content, Data, Direct, Exchange, Filters, Hackers, Harvest, Microsoft, Send, Sensitive

Post navigation

Previous Post: Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data
Next Post: Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

Related Posts

Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Cyber Security News
Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks Cyber Security News
Halo Security Achieves SOC 2 Type 1 Compliance Cyber Security News
Weak Password Let Ransomware Gang Destroy 158-Year-Old Company Cyber Security News
Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability Cyber Security News
Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability
  • Pwn2Own WhatsApp Hacker Says Exploit Privately Disclosed to Meta
  • Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories
  • Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack
  • Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability
  • Pwn2Own WhatsApp Hacker Says Exploit Privately Disclosed to Meta
  • Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories
  • Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack
  • Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News