Varonis Threat Labs uncovered a phishing campaign actively exploiting Microsoft 365’s Direct Send feature. This functionality – intended for internal, unauthenticated email delivery from devices like printers – has been hijacked by threat actors to spoof internal users without account compromise. The abuse enables malicious emails to bypass traditional email security by appearing as legitimate internal messages, posing a major risk to enterprise security.
1. To detect misuse of Direct Send, defenders must combine email header analysis, behavioral anomaly detection, and infrastructure monitoring.
Email Header Indicators:
Behavioral Indicators:
2. Enable “Reject Direct Send”: Microsoft introduced this in Exchange Admin Center to block unauthenticated traffic using Direct Send.
3. Enforce strict SPF/DMARC/DKIM policies
4. Educate staff about the risks of QR code phishing (quishing). Train users to report internal-looking emails with suspicious attachments.
5. It’s always recommended to enforce MFA on all users and have Conditional Access Policies in place, in case a user’s credentials are stolen.
6. Block the IOCs at their respective controls:https://www.virustotal.com/gui/collection/a63f0b29f78b93f927e06a5b619895746e1649330e1d31f4ca67f72f65741aca/iocs
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy