Many people are getting better at spotting phishing attacks from outside sources. But what if the attack appears to come from within your own company? A recently discovered vulnerability in Microsoft 365 is being used to bypass traditional security, making it easier than ever for hackers to send you convincing fake emails that slip past your defenses.
At the heart of this new threat is a Microsoft 365 feature called Direct Send. It was created for a simple, helpful reason: to allow internal office devices, such as printers and scanners, to send you emails — such as a scanned document — without needing to log in with a password. This feature is designed for convenience and is intended only for internal use.
However, this convenience has created a security loophole. Because Direct Send doesn’t require authentication, hackers have found a way to exploit it to send phishing emails without needing to steal a single password or compromise any accounts. All they need is a few publicly available details and some guesswork to figure out your company’s email address format.
Once an attacker has a valid internal email address, they can use the Direct Send system to send emails that look like they’re from someone inside your organization. And because these emails are routed through Microsoft’s own infrastructure and appear to be internal, they often bypass the very security filters designed to catch suspicious messages.
In a recent campaign that affected over 70 organizations, attackers used this method to send fake voicemail notifications containing malicious QR codes, which tricked users into visiting websites that stole their Microsoft 365 credentials.
While the technical fix is up to your IT team, everyone can help prevent these attacks by being cautious.
This attack exploits a misconfiguration, not an impossible-to-stop, zero-day threat. Your technical team can take several steps to shut this vulnerability down.
Don’t wait for an attack to test your defenses. Contact our cybersecurity experts today for help securing your email systems and for more information on how to protect your organization.