Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks

Posted on August 2, 2025August 2, 2025 By CWS

Cybercriminals have found a complicated new assault vector by exploiting Microsoft 365’s Direct Ship characteristic to ship phishing campaigns that masquerade as legit inner communications.

This rising menace leverages a legit Microsoft service designed for multifunction printers and legacy purposes, turning it right into a weapon for social engineering assaults that bypass conventional e mail safety controls.

The assault marketing campaign represents a major evolution in phishing ways, as menace actors can now ship malicious emails that seem to originate from inside the goal group with out requiring legitimate credentials or authentication.

By exploiting Direct Ship’s inherent belief mannequin, attackers obtain unprecedented credibility of their phishing makes an attempt, making detection and prevention significantly more difficult for safety groups.

Proofpoint researchers recognized this lively marketing campaign concentrating on Microsoft 365 tenants via a fancy infrastructure involving unsecured third-party e mail safety home equipment and digital personal server property.

The subtle operation demonstrates how cybercriminals proceed to weaponize legit cloud companies to evade detection and enhance the success fee of their social engineering campaigns.

Technical Assault Infrastructure and Message Injection Circulate

The assault mechanism follows a rigorously orchestrated four-step course of that exploits a number of layers of e mail infrastructure.

Attackers initially set up connections to digital hosts working Home windows Server 2022 via Distant Desktop Protocol on port 3389, offering them with a legit Home windows setting for his or her operations.

Assault movement (Supply – Proofpoint)

From these compromised hosts, they provoke SMTP connections to unsecured third-party e mail safety home equipment hosted by regional Infrastructure-as-a-Service suppliers.

These compromised home equipment function SMTP relays, that includes legitimate DigiCert SSL certificates and supporting AUTH PLAIN LOGIN with STARTTLS encryption.

Nonetheless, the home equipment expose weak ports 8008, 8010, and 8015 with expired or self-signed certificates, creating safety gaps that attackers exploit.

The malicious messages are then relayed via these home equipment on to Microsoft 365 tenants, the place they’re delivered through Direct Ship utilizing spoofed inner sender addresses.

Organizations can implement fast safety by executing the PowerShell command Set-OrganizationConfig -RejectDirectSend $true to disable Direct Ship performance.

Moreover, monitoring message headers for composite authentication failures marked as compauth=fail can assist determine these subtle spoofing makes an attempt earlier than they attain finish customers.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:365s, Abuse, Attacks, Deliver, Direct, Feature, Hackers, Internal, Microsoft, Phishing, Send

Post navigation

Previous Post: Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections
Next Post: 11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware

Related Posts

SAP June 2025 Patch Day Cyber Security News
143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025 Cyber Security News
Achieving Data Privacy Regulation Compliance in 2025 Frameworks Cyber Security News
Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada Cyber Security News
Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts Cyber Security News
20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads
  • Agentless Access, Sensitive Data Masking, and Smooth Session Playback
  • Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads
  • PureHVNC RAT Developers Leverage GitHub Host Source Code
  • Virtual Event Today: Attack Surface Management Summit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads
  • Agentless Access, Sensitive Data Masking, and Smooth Session Playback
  • Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads
  • PureHVNC RAT Developers Leverage GitHub Host Source Code
  • Virtual Event Today: Attack Surface Management Summit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News