Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks

Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks

Posted on November 17, 2025November 17, 2025 By CWS

A brand new phishing marketing campaign has emerged that weaponizes Microsoft Entra visitor consumer invites to deceive recipients into making telephone calls to attackers posing as Microsoft assist.

The assault leverages a important safety hole in how Microsoft Entra communicates with exterior customers, turning a official collaboration characteristic right into a supply mechanism for classy social engineering assaults.

This marketing campaign represents an evolution in TOAD (Phone Oriented Assault Supply) techniques, combining cloud-based credential methods with conventional phone-based scams to compromise organizational safety.

Michael Taggart, a safety analyst and researcher, recognized this novel assault vector after discovering a number of phishing campaigns exploiting the visitor invitation system.

The malware marketing campaign makes use of Microsoft Entra tenant invites despatched from the official invitations@microsoft[.]com handle to bypass e-mail filters and set up belief with targets.

Attackers register faux organizational tenants with names like “Unified Workspace Crew,” “CloudSync,” and “Superior Suite Providers” to impersonate official Microsoft entities.

The assault chain demonstrates subtle coordination between cloud infrastructure abuse and social engineering.

As soon as recipients obtain the invitation e-mail, they encounter a convincing message claiming their Microsoft 365 annual plan requires renewal processing, full with fabricated transaction particulars together with reference numbers, buyer IDs, and billing quantities of roughly $446.46.

The message instructs customers to contact a telephone quantity listed as Microsoft Billing Help, which really connects them on to attackers who proceed with credential harvesting and account takeover makes an attempt.

Detection Evasion Via Reputable Infrastructure

The an infection mechanism exploits a elementary weak point in Entra’s design: the Message area in visitor consumer invites accepts arbitrarily lengthy textual content, permitting attackers to embed intensive phishing content material with out triggering conventional safety alerts.

Entra Visitor consumer invites (Supply – Taggart-Tech)

For the reason that invitation originates from Microsoft’s official infrastructure, e-mail safety methods not often flag these communications as malicious.

The attackers register a number of faux tenant domains, together with x44xfqf.onmicrosoft[.]com, woodedlif.onmicrosoft[.]com, and xeyi1ba.onmicrosoft[.]com, making a community of persistent infrastructure for steady marketing campaign deployment.

Organizations ought to implement rapid detection measures by looking e-mail logs for indicators, together with the sender handle invitations@microsoft[.]com, topic line key phrases like “invited you to entry purposes inside their group,” and recognized attacker tenant names.

Community directors can block the telephone numbers related to these campaigns whereas educating customers about verifying Microsoft communications by official assist channels somewhat than responding to invitation-based requests.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, Entra, Hackers, Invitations, Launch, Leverages, Microsoft, Tenant, TOAD

Post navigation

Previous Post: CISA Warns of Fortinet FortiWeb WAF Vulnerability Exploited in the Wild to Gain Admin Access
Next Post: TaskHound Tool – Detects Windows Scheduled Tasks Running with Elevated Privileges and Stored Credentials

Related Posts

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer Cyber Security News
SAP Security Patch Day – 15 Vulnerabilities Patched including 3 Critical Injection Vulnerabilities SAP Security Patch Day – 15 Vulnerabilities Patched including 3 Critical Injection Vulnerabilities Cyber Security News
PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks Cyber Security News
How to Implement Zero Trust Architecture in Enterprise Networks How to Implement Zero Trust Architecture in Enterprise Networks Cyber Security News
CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks Cyber Security News
Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News