Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing

Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing

10 January 2026 08:52

Phishing attacks are becoming increasingly insidious, to the point of perfectly mimicking internal corporate communications . This is the alarm raised by Microsoft, which has observed a significant increase in malicious emails capable of masquerading as legitimate messages sent by colleagues, HR departments, or company executives.

According to Microsoft Threat Intelligence , cybercriminals are exploiting misconfigurations in Microsoft 365 email systems and complex email routing schemes to bypass anti-spoofing controls. The problem arises specifically when a domain’s MX record doesn’t point directly to Microsoft 365, but instead passes through on-premises Exchange servers or third-party email services.

In this security vacuum, sender authenticity checks can be less effective. The result is dangerous: emails with spoofed addresses belonging to the same organization’s domain manage to bypass filters and appear as internal communications. In some cases, the “From” and “To” fields match, further reinforcing the illusion of legitimacy.
Microsoft reports that this technique has been used in opportunistic campaigns active since at least May 2025, targeting organizations across various sectors. The emails often link to pages designed to steal credentials and are linked to phishing-as-a-service (PHAaS) platforms, particularly the Tycoon 2FA toolkit.

In October 2025 alone, the Redmond company blocked over 13 million malicious messages associated with this infrastructure.
PhaaS platforms dramatically lower the entry threshold for cybercriminals by offering ready-made templates, hosting, and advanced tools, including Adversary-in-the-Middle (AitM) attacks that can bypass multi-factor authentication.

The emails’ content is designed to sound credible and “office-like”: voice messages, shared documents, HR communications, password reset requests, or expiration notices. Financial scenarios are particularly insidious, where victims are pressured into paying nonexistent invoices.

The emails may appear to be a follow-up conversation with the CEO or accounting department and include realistic attachments: large invoices, W-9 forms with bank details, and even fake bank confirmation letters.

The consequences are typical of successful phishing: stolen credentials, compromised email accounts and company documents, and even Business Email Compromise (BEC) cases with significant financial damage.
Microsoft emphasizes one key point, however: if your domain’s MX record points directly to Microsoft 365, this type of complex routing-based spoofing is not effective.

To reduce risk, the company recommends strengthening email security configurations: implementing strict DMARC policies in “reject” mode, configuring SPF with hard fail, carefully testing connectors to third-party services (such as anti-spam or archiving), and disabling Direct Send unless absolutely necessary to block emails attempting to impersonate the company domain.

In short, even emails that “appear to come from within” should never be trusted by default. In the new threat landscape, blind trust has become a luxury that companies can no longer afford.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.