Microsoft 365 Direct Send Abuse: Phishing Risks & Security Recommendations
Aug. 18, 2025, 2:43 p.m.
Description
Threat actors are actively exploiting Microsoft 365's Direct Send feature to deliver phishing emails, bypassing perimeter security solutions by routing malicious messages through trusted infrastructure. This technique requires no credentials, only knowledge of the target domain and valid recipient addresses. The attack process involves identifying organizational domains, crafting emails impersonating internal users, and delivering them through Microsoft 365's infrastructure. Recent campaigns have successfully harvested credentials and established footholds within targeted environments. Attackers use automated tools to generate convincing business-themed lures, often utilizing PDF and DOCX attachments with QR codes or obfuscated HTML leading to phishing pages. The abuse of Direct Send represents a critical gap in email security defenses, particularly for organizations relying heavily on email communications.
Tags
Date
- Created: Aug. 18, 2025, 2:16 p.m.
- Published: Aug. 18, 2025, 2:16 p.m.
- Modified: Aug. 18, 2025, 2:43 p.m.
Indicators
- f24785156ec9c045e88eed48b2a262996a12e7bc62f50784bba9334172668275
- df6bc150a77c36beafbfd0c59daa7a8960bb090743b778477e25805195640c0c
- d5800e021a88c6e91f1605b892e8aefe1ba21719022417746a64a4acba13e903
- cf74d4c1c3e8317c43aacdcda57cb8da032477e24732d0a7987c8bf5aa9ff186
- cc2f055a242eec9ba870fc3040883439666266a018c833b72bb201592ff0c0e4
- ca82e7201694b964e0f6702e08f75f98f0732552aefaed6ae8b170689341bfe2
- c2394537d5e7b3c1c9afc73408b5c6b1c1154650a4a8454b9f4e534c9ddbd092
- b96ee4c2bdf566a5740dc100cf1c70896cd2806fac42d46b022d5c52c3a8a52a
- b810f7e999d5824147535e3974cf349010f78badaa0428c554bb3e5eec56db2f
- 988d3069d1241d2784debeb6946c57a8c66221d7fbfbd6228b2b8b3cc4e92a50
- 975b04bb26d5fe627e195bdf46fc4eec7b25b63d7b4ab926b437a04903ec522f
- 7c11352b17e325a53e3a73e34459fc55b90ceaf2c3cd4dc4421be879c7147391
- 625561c24491e8b68efa34e14c5a332c63c6121a333f700af4ff6801ebe587c8
- 5b6aa8f966e240f620ad10417ff4804941966f878cc83020391ad786f5360f43
- 48171e699562fe854418797cd8b8517b3f5eec598fd89e3d20c5a8f346176bf2
- 3f52227acb6f97853b491cdaab53630cb21b3337a972efcb05660cd139df2482
- 3432411a3bb498e6688d24dc3824b6469242d42d0b8742116479f35a8c05ab5a
- 19279573e2c3b0e6348bb305e3101531eea978037330636942a0be85dccd62c1
- 092d0be4a754532ad49e202eeba2a7709dad03f3f58cf72205f38efc668ebabd
- 0736b07c27ff2ff21175991c2ffae38d75a66bbb57fe4390afb3347e4d6e691a
- 51.89.87.86
- 23.163.0.158
- 141.95.71.216
- 141.95.114.238
- 139.28.38.90
- jmvthr.owlrd.ru
- djvzk.uekmu.es