Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks

Posted on August 2, 2025August 2, 2025 By CWS

Cybercriminals have found a complicated new assault vector by exploiting Microsoft 365’s Direct Ship characteristic to ship phishing campaigns that masquerade as legit inner communications.

This rising menace leverages a legit Microsoft service designed for multifunction printers and legacy purposes, turning it right into a weapon for social engineering assaults that bypass conventional e mail safety controls.

The assault marketing campaign represents a major evolution in phishing ways, as menace actors can now ship malicious emails that seem to originate from inside the goal group with out requiring legitimate credentials or authentication.

By exploiting Direct Ship’s inherent belief mannequin, attackers obtain unprecedented credibility of their phishing makes an attempt, making detection and prevention significantly more difficult for safety groups.

Proofpoint researchers recognized this lively marketing campaign concentrating on Microsoft 365 tenants via a fancy infrastructure involving unsecured third-party e mail safety home equipment and digital personal server property.

The subtle operation demonstrates how cybercriminals proceed to weaponize legit cloud companies to evade detection and enhance the success fee of their social engineering campaigns.

Technical Assault Infrastructure and Message Injection Circulate

The assault mechanism follows a rigorously orchestrated four-step course of that exploits a number of layers of e mail infrastructure.

Attackers initially set up connections to digital hosts working Home windows Server 2022 via Distant Desktop Protocol on port 3389, offering them with a legit Home windows setting for his or her operations.

Assault movement (Supply – Proofpoint)

From these compromised hosts, they provoke SMTP connections to unsecured third-party e mail safety home equipment hosted by regional Infrastructure-as-a-Service suppliers.

These compromised home equipment function SMTP relays, that includes legitimate DigiCert SSL certificates and supporting AUTH PLAIN LOGIN with STARTTLS encryption.

Nonetheless, the home equipment expose weak ports 8008, 8010, and 8015 with expired or self-signed certificates, creating safety gaps that attackers exploit.

The malicious messages are then relayed via these home equipment on to Microsoft 365 tenants, the place they’re delivered through Direct Ship utilizing spoofed inner sender addresses.

Organizations can implement fast safety by executing the PowerShell command Set-OrganizationConfig -RejectDirectSend $true to disable Direct Ship performance.

Moreover, monitoring message headers for composite authentication failures marked as compauth=fail can assist determine these subtle spoofing makes an attempt earlier than they attain finish customers.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:365s, Abuse, Attacks, Deliver, Direct, Feature, Hackers, Internal, Microsoft, Phishing, Send

Post navigation

Previous Post: Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections
Next Post: 11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware

Related Posts

Microsoft Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges Cyber Security News
Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy Cyber Security News
UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled Cyber Security News
Microsoft, SentinelOne, and Palo Alto Networks Withdraw from 2026 MITRE ATT&CK Evaluations Cyber Security News
VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands Cyber Security News
New Phishing Attack Via OneDrive Attacking C-level Employs for Corporate Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News