Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks

Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks

Posted on November 17, 2025November 17, 2025 By CWS

A brand new phishing marketing campaign has emerged that weaponizes Microsoft Entra visitor consumer invites to deceive recipients into making telephone calls to attackers posing as Microsoft assist.

The assault leverages a important safety hole in how Microsoft Entra communicates with exterior customers, turning a official collaboration characteristic right into a supply mechanism for classy social engineering assaults.

This marketing campaign represents an evolution in TOAD (Phone Oriented Assault Supply) techniques, combining cloud-based credential methods with conventional phone-based scams to compromise organizational safety.

Michael Taggart, a safety analyst and researcher, recognized this novel assault vector after discovering a number of phishing campaigns exploiting the visitor invitation system.

The malware marketing campaign makes use of Microsoft Entra tenant invites despatched from the official invitations@microsoft[.]com handle to bypass e-mail filters and set up belief with targets.

Attackers register faux organizational tenants with names like “Unified Workspace Crew,” “CloudSync,” and “Superior Suite Providers” to impersonate official Microsoft entities.

The assault chain demonstrates subtle coordination between cloud infrastructure abuse and social engineering.

As soon as recipients obtain the invitation e-mail, they encounter a convincing message claiming their Microsoft 365 annual plan requires renewal processing, full with fabricated transaction particulars together with reference numbers, buyer IDs, and billing quantities of roughly $446.46.

The message instructs customers to contact a telephone quantity listed as Microsoft Billing Help, which really connects them on to attackers who proceed with credential harvesting and account takeover makes an attempt.

Detection Evasion Via Reputable Infrastructure

The an infection mechanism exploits a elementary weak point in Entra’s design: the Message area in visitor consumer invites accepts arbitrarily lengthy textual content, permitting attackers to embed intensive phishing content material with out triggering conventional safety alerts.

Entra Visitor consumer invites (Supply – Taggart-Tech)

For the reason that invitation originates from Microsoft’s official infrastructure, e-mail safety methods not often flag these communications as malicious.

The attackers register a number of faux tenant domains, together with x44xfqf.onmicrosoft[.]com, woodedlif.onmicrosoft[.]com, and xeyi1ba.onmicrosoft[.]com, making a community of persistent infrastructure for steady marketing campaign deployment.

Organizations ought to implement rapid detection measures by looking e-mail logs for indicators, together with the sender handle invitations@microsoft[.]com, topic line key phrases like “invited you to entry purposes inside their group,” and recognized attacker tenant names.

Community directors can block the telephone numbers related to these campaigns whereas educating customers about verifying Microsoft communications by official assist channels somewhat than responding to invitation-based requests.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, Entra, Hackers, Invitations, Launch, Leverages, Microsoft, Tenant, TOAD

Post navigation

Previous Post: CISA Warns of Fortinet FortiWeb WAF Vulnerability Exploited in the Wild to Gain Admin Access
Next Post: TaskHound Tool – Detects Windows Scheduled Tasks Running with Elevated Privileges and Stored Credentials

Related Posts

Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment Cyber Security News
What Are The Takeaways from The Scattered Lapsus $Hunters Statement? What Are The Takeaways from The Scattered Lapsus $Hunters Statement? Cyber Security News
28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online 28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online Cyber Security News
Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack Cyber Security News
Microsoft Patch Tuesday August 2025 Released Microsoft Patch Tuesday August 2025 Released Cyber Security News
Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark