Friday, April 25, 2025
Homecyber securitySophisticated Phishing Attack Leverages Microsoft 365 Infrastructure to Target Users

Sophisticated Phishing Attack Leverages Microsoft 365 Infrastructure to Target Users

Published on

SIEM as a Service

Follow Us on Google News

A highly sophisticated phishing campaign has been uncovered exploiting Microsoft 365’s trusted infrastructure to facilitate credential harvesting and account takeover attempts.

This attack leverages legitimate Microsoft domains and tenant misconfigurations to conduct Business Email Compromise (BEC) operations, effectively bypassing traditional email security controls by exploiting inherent trust mechanisms within the Microsoft ecosystem.

Attack Mechanism

The attack involves multiple phases, starting with the establishment of control over multiple Microsoft 365 organization tenants.

- Advertisement - Google News

These tenants are strategically used for different purposes: one for fraudulent activities like unauthorized purchases, another for brand impersonation to enhance credibility, and a third as a covert relay point to reroute phishing emails while bypassing security controls.

By distributing attack functionalities across these tenants, the threat actor minimizes risk and ensures the resilience of the phishing infrastructure.

 Phishing Attack
Multiple attack vectors

Once control is established, attackers create administrative accounts using the default “*.onmicrosoft.com” domain, reducing visibility within standard monitoring tools.

They then configure mail forwarding and transport rules to redirect subscription confirmation emails and other service alerts to victims.

According to the Guardz Report, this technique exploits legitimate email forwarding features within Microsoft 365, allowing fraudulent messages to blend seamlessly into trusted email flows and evade traditional anti-phishing protections.

Social Engineering and Detection Challenges

To enhance credibility, attackers manipulate tenant display information to mimic legitimate Microsoft transaction notifications.

For example, they embed a phishing lure directly into the email by using the organization name field, instructing victims to call a fraudulent support number.

 Phishing Attack
Header Analysis

This approach bypasses URL security mechanisms and leverages Microsoft’s trusted infrastructure, making it difficult for recipients to distinguish between legitimate and malicious communications.

The attack is particularly effective because it bypasses traditional email security controls, generates emails with valid authentication markers (SPF, DKIM, DMARC), and creates urgency by appearing related to unauthorized financial transactions.

Moreover, it shifts the attack vector to a voice channel, where security controls are less robust.

Traditional email authentication methods are ineffective against this attack since the phishing emails originate from legitimate Microsoft domains.

To combat this threat, enhanced email analysis is necessary, focusing on content inspection of organization fields and metadata.

User awareness training is also crucial to recognize suspicious elements and avoid calling unverified numbers.

Additionally, validating official support numbers through Microsoft’s official directory can help prevent victim engagement.

Being cautious of communications from unfamiliar .onmicrosoft.com domains or newly created tenants is also advisable.

By adapting detection and response capabilities to address these evolving threats, defenders can better protect against sophisticated phishing attacks that exploit legitimate infrastructure.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...