Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

EU project to accelerate hydrogen production in Norway

New RFP template for AI usage control and AI governance

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft warns that incorrect email routing settings can allow internal domain phishing
Identity

Microsoft warns that incorrect email routing settings can allow internal domain phishing

userBy userJanuary 7, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 7, 2026Ravi LakshmananEmail Security/Financial Fraud

Phishing attackers exploit routing scenarios and misconfigured spoofing protections to impersonate an organization’s domain and distribute emails that appear to be sent internally.

“Threat actors are leveraging this vector to deliver a variety of phishing messages related to various phishing-as-a-service (PhaaS) platforms, such as Tycoon 2FA,” the Microsoft Threat Intelligence team said in a Tuesday report. “These include decoy messages with themes such as voicemails, shared documents, communications from human resources, password resets and expiration dates, etc., leading to credential phishing.”

While this attack vector is not necessarily new, the tech giant said it has seen a sharp increase in the use of this tactic since May 2025 as part of opportunistic campaigns targeting a wide range of organizations across multiple industries and verticals. This includes campaigns that use spoofed emails to commit financial fraud against organizations.

A successful attack can allow attackers to extract credentials and use them for subsequent activities ranging from data theft to business email compromise (BEC).

cyber security

This issue primarily occurs in scenarios where tenants have configured complex routing scenarios and impersonation protection is not strictly enforced. Examples of complex routing include pointing mail exchanger records (MX records) to an on-premises Exchange environment or a third-party service before reaching Microsoft 365.

This creates a security gap that attackers can exploit to send spoofed phishing messages that appear to originate from the tenant’s own domain. The majority of phishing campaigns that utilize this approach have been found to utilize the Tycoon 2FA PhaaS kit. Microsoft announced that it blocked more than 13 million malicious emails related to this kit in October 2025.

PhaaS toolkits are plug-and-play platforms that allow fraudsters to easily create and manage phishing campaigns, making them accessible to those with limited technical skills. They provide features such as customizable phishing templates, infrastructure, and other tools to facilitate credential theft and bypass multi-factor authentication using man-in-the-middle (AiTM) phishing.

The Windows maker said it also discovered emails that tricked organizations into paying bogus invoices, which could lead to financial losses. Spoofed messages can also impersonate legitimate services, such as DocuSign, or claim to be from Human Resources regarding changes to pay or benefits.

Phishing emails that propagate financial fraud often resemble conversations between the targeted organization’s CEO, individuals requesting payment for services rendered, or a company’s accounting department. It also includes three attachments that lend a false sense of confidence to the scheme.

Fake invoices for thousands of dollars transferred to bank accounts IRS W-9 forms with the names and social security numbers of the individuals used to set up the bank accounts Fake bank letters were allegedly provided by employees of the online bank used to set up the fraudulent accounts

“They may use clickable links in the email body, QR codes in attachments, or other means to direct recipients to a phishing landing page,” it added. “Appearing to be sent from an internal email address is the most noticeable difference to end users, and in many cases the same email address[宛先]field and[差出人]used for fields. ”

cyber security

To combat this risk, we recommend that organizations set up strict Domain-Based Message Authentication, Reporting, and Conformance (DMARC) rejection policies and Sender Policy Framework (SPF) hard fail policies, and appropriately configure third-party connectors such as spam filter services and archiving tools.

Note that tenants with MX records that point directly to Office 365 are not vulnerable to attack vectors. Additionally, if you don’t need to reject emails that impersonate your organization’s domain, we recommend turning off Direct Send.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe missing link in the circular economy
Next Article SHASAI Project Protects AI Systems from Cybersecurity Threats
user
  • Website

Related Posts

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

March 4, 2026

New RFP template for AI usage control and AI governance

March 4, 2026

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

EU project to accelerate hydrogen production in Norway

New RFP template for AI usage control and AI governance

Inside the EU’s military innovation push

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.