Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks

Posted on November 17, 2025November 17, 2025 By CWS

A brand new phishing marketing campaign has emerged that weaponizes Microsoft Entra visitor consumer invites to deceive recipients into making telephone calls to attackers posing as Microsoft assist.

The assault leverages a important safety hole in how Microsoft Entra communicates with exterior customers, turning a official collaboration characteristic right into a supply mechanism for classy social engineering assaults.

This marketing campaign represents an evolution in TOAD (Phone Oriented Assault Supply) techniques, combining cloud-based credential methods with conventional phone-based scams to compromise organizational safety.

Michael Taggart, a safety analyst and researcher, recognized this novel assault vector after discovering a number of phishing campaigns exploiting the visitor invitation system.

The malware marketing campaign makes use of Microsoft Entra tenant invites despatched from the official invitations@microsoft[.]com handle to bypass e-mail filters and set up belief with targets.

Attackers register faux organizational tenants with names like “Unified Workspace Crew,” “CloudSync,” and “Superior Suite Providers” to impersonate official Microsoft entities.

The assault chain demonstrates subtle coordination between cloud infrastructure abuse and social engineering.

As soon as recipients obtain the invitation e-mail, they encounter a convincing message claiming their Microsoft 365 annual plan requires renewal processing, full with fabricated transaction particulars together with reference numbers, buyer IDs, and billing quantities of roughly $446.46.

The message instructs customers to contact a telephone quantity listed as Microsoft Billing Help, which really connects them on to attackers who proceed with credential harvesting and account takeover makes an attempt.

Detection Evasion Via Reputable Infrastructure

The an infection mechanism exploits a elementary weak point in Entra’s design: the Message area in visitor consumer invites accepts arbitrarily lengthy textual content, permitting attackers to embed intensive phishing content material with out triggering conventional safety alerts.

Entra Visitor consumer invites (Supply – Taggart-Tech)

For the reason that invitation originates from Microsoft’s official infrastructure, e-mail safety methods not often flag these communications as malicious.

The attackers register a number of faux tenant domains, together with x44xfqf.onmicrosoft[.]com, woodedlif.onmicrosoft[.]com, and xeyi1ba.onmicrosoft[.]com, making a community of persistent infrastructure for steady marketing campaign deployment.

Organizations ought to implement rapid detection measures by looking e-mail logs for indicators, together with the sender handle invitations@microsoft[.]com, topic line key phrases like “invited you to entry purposes inside their group,” and recognized attacker tenant names.

Community directors can block the telephone numbers related to these campaigns whereas educating customers about verifying Microsoft communications by official assist channels somewhat than responding to invitation-based requests.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, Entra, Hackers, Invitations, Launch, Leverages, Microsoft, Tenant, TOAD

Post navigation

Previous Post: CISA Warns of Fortinet FortiWeb WAF Vulnerability Exploited in the Wild to Gain Admin Access
Next Post: TaskHound Tool – Detects Windows Scheduled Tasks Running with Elevated Privileges and Stored Credentials

Related Posts

VMware Tools and Aria Operations Vulnerabilities Let Attackers Escalate Privileges to Root Cyber Security News
Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins Cyber Security News
Critical Vulnerability In Chromium’s Blink Let Attackers Crash Chromium-based Browsers Within Seconds Cyber Security News
3 Key Benefits For SOCs And MSSPs  Cyber Security News
ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words Cyber Security News
Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News