Cyber Security News

Sophisticated Phishing Attack Leverages Microsoft 365 Infrastructure to Target Users

A highly sophisticated phishing campaign has been uncovered exploiting Microsoft 365’s trusted infrastructure to facilitate credential harvesting and account takeover attempts.

This attack leverages legitimate Microsoft domains and tenant misconfigurations to conduct Business Email Compromise (BEC) operations, effectively bypassing traditional email security controls by exploiting inherent trust mechanisms within the Microsoft ecosystem.

Attack Mechanism

The attack involves multiple phases, starting with the establishment of control over multiple Microsoft 365 organization tenants.

These tenants are strategically used for different purposes: one for fraudulent activities like unauthorized purchases, another for brand impersonation to enhance credibility, and a third as a covert relay point to reroute phishing emails while bypassing security controls.

By distributing attack functionalities across these tenants, the threat actor minimizes risk and ensures the resilience of the phishing infrastructure.

 Phishing Attack Phishing Attack
Multiple attack vectors

Once control is established, attackers create administrative accounts using the default “*.onmicrosoft.com” domain, reducing visibility within standard monitoring tools.

They then configure mail forwarding and transport rules to redirect subscription confirmation emails and other service alerts to victims.

According to the Guardz Report, this technique exploits legitimate email forwarding features within Microsoft 365, allowing fraudulent messages to blend seamlessly into trusted email flows and evade traditional anti-phishing protections.

Social Engineering and Detection Challenges

To enhance credibility, attackers manipulate tenant display information to mimic legitimate Microsoft transaction notifications.

For example, they embed a phishing lure directly into the email by using the organization name field, instructing victims to call a fraudulent support number.

Header Analysis

This approach bypasses URL security mechanisms and leverages Microsoft’s trusted infrastructure, making it difficult for recipients to distinguish between legitimate and malicious communications.

The attack is particularly effective because it bypasses traditional email security controls, generates emails with valid authentication markers (SPF, DKIM, DMARC), and creates urgency by appearing related to unauthorized financial transactions.

Moreover, it shifts the attack vector to a voice channel, where security controls are less robust.

Traditional email authentication methods are ineffective against this attack since the phishing emails originate from legitimate Microsoft domains.

To combat this threat, enhanced email analysis is necessary, focusing on content inspection of organization fields and metadata.

User awareness training is also crucial to recognize suspicious elements and avoid calling unverified numbers.

Additionally, validating official support numbers through Microsoft’s official directory can help prevent victim engagement.

Being cautious of communications from unfamiliar .onmicrosoft.com domains or newly created tenants is also advisable.

By adapting detection and response capabilities to address these evolving threats, defenders can better protect against sophisticated phishing attacks that exploit legitimate infrastructure.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and home…

54 minutes ago

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s AI…

2 hours ago

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…

14 hours ago

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…

14 hours ago

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…

14 hours ago

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…

14 hours ago