Sunday, March 2, 2025
Homecyber securityMicrosoft 365 Flags Emails with Images as Malware: A Growing Concern for...

Microsoft 365 Flags Emails with Images as Malware: A Growing Concern for Users

Published on

SIEM as a Service

Follow Us on Google News

Microsoft 365 users have reported a troubling issue in which email messages containing images are incorrectly flagged as malware and subsequently quarantined.

This incident, identified as Issue ID: EX873252, has sparked widespread concern among businesses and individual users who rely on Exchange Online for their daily communications.

Incident Overview

The problem, categorized as a service degradation incident, affects Exchange Online, a key component of Microsoft 365.

Users have noticed that legitimate emails containing images are mistakenly identified as threats, leading to disruptions in communication.

This has raised alarms, particularly for businesses that depend heavily on email for client interactions and internal communications.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN -14-day free trial

Figure 1Email Flagged Incorrectly (source:Microsoft)
Figure 1Email Flagged Incorrectly (source:Microsoft)

Microsoft has acknowledged the issue and assured users that they are actively working on a resolution.

However, the exact timeline for when the service will return to normal remains unclear, leaving users uncertain.

User Impact and Concerns

The incorrect flagging of emails has led to significant inconvenience for users. Many have expressed frustration over the inability to access essential communications and attachments.

Businesses, in particular, are feeling the strain as the issue hampers their operations and client relations.

The incident highlights the growing challenges in balancing cybersecurity measures with user accessibility.

Microsoft has advised users to remain patient as they work towards a solution. In the meantime, affected users are encouraged to check their quarantine folders regularly and manually release any emails that have been incorrectly flagged.

Microsoft has acknowledged the service degradation and is prioritizing resolving this issue. They have deployed teams to investigate the root cause and are implementing measures to prevent similar incidents in the future.

While the exact timeframe for a fix is not specified, Microsoft is committed to restoring regular service as swiftly as possible.

As the situation develops, users are advised to stay updated through official Microsoft channels for the latest information and guidance on managing the impact of this incident.

Protect Your Business with Cynet Managed All-in-One Cybersecurity Platform – Try Free Trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network...

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network...

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...