Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft 365 Direct Send Abused for Phishing

Posted on June 27, 2025June 27, 2025 By CWS

Microsoft 365 Direct Ship has been abused in a phishing marketing campaign to ship spoofed messages that seem to originate from throughout the sufferer’s group, Varonis warns.

An Alternate On-line function, Direct Ship permits purposes and units to ship emails throughout the tenant. It depends on a sensible host and doesn’t require authentication for e mail technology.

Based on Varonis, menace actors have found a strategy to abuse the function’s lack of authentication to ship spoofed emails that bypass safety controls, all with out having to compromise an account throughout the goal group.

As a result of good host addresses observe a predictable sample, the attacker solely must determine the group’s area and a sound recipient, after which abuse the Direct Ship setup to ship phishing emails, “with out ever logging in or touching the tenant”, Varonis says.

Within the phishing marketing campaign noticed by the cybersecurity agency, as a result of the good hosts had been accepting emails from exterior sources, menace actors had been seen using PowerShell to ship the spoofed emails.

“As a result of the e-mail is routed by Microsoft’s infrastructure and seems to originate from throughout the tenant, it could actually bypass conventional e mail safety controls,” Varonis notes.

In a single case, the emails resembled voicemail notifications and carried a PDF attachment that contained a QR code directing the recipients to a Microsoft 365 phishing web page.

“The e-mail originated from an exterior IP, failed SPF and DMARC checks, and lacked DKIM signatures, but it was accepted and delivered internally through the good host. It is a textbook instance of how Direct Ship may be exploited when left unprotected,” the corporate notes.Commercial. Scroll to proceed studying.

To stop such assaults, organizations are suggested to allow the Reject Direct Ship possibility within the Alternate admin heart, to implement strict DMARC insurance policies and e mail safety controls, and to coach staff on phishing and the chance of QR code attachments.

Imposing multi-factor authentication (MFA) and a static IP handle within the SPF file must also scale back the chance related to this abuse.

To determine Direct Ship abuse, organizations ought to look in message headers for exterior IPs despatched to the good host, analyze SPF, DKIM, and DMARC failures, and seek for a sensible host within the SPF file.

Associated: Cloudflare Tunnels Abused in New Malware Marketing campaign

Associated: Russian Hackers Bypass Gmail MFA With App-Particular Password Ruse

Associated: Google Warns of Vishing, Extortion Marketing campaign Concentrating on Salesforce Clients

Associated: Taming the Hacker Storm: Why Hundreds of thousands in Cybersecurity Spending Isn’t Sufficient

Security Week News Tags:Abused, Direct, Microsoft, Phishing, Send

Post navigation

Previous Post: MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted
Next Post: Vulnerability Exposed All Open VSX Repositories to Takeover

Related Posts

Asheville Eye Associates Says 147,000 Impacted by Data Breach Security Week News
Adobe Patches Big Batch of Critical-Severity Software Flaws Security Week News
Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently Security Week News
Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names Security Week News
US Announces Botnet Takedown, Charges Against Russian Administrators Security Week News
Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack
  • Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage 
  • Business Case for Agentic AI SOC Analysts
  • MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition
  • Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack
  • Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage 
  • Business Case for Agentic AI SOC Analysts
  • MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition
  • Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News