Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data


Cybercriminals are increasingly exploiting a legitimate Microsoft 365 feature designed for enterprise convenience, turning Exchange Online’s Direct Send into a dangerous vector for phishing campaigns and business email compromise attacks.

Security researchers across the industry are sounding the alarm as malicious actors leverage this trusted pathway to bypass authentication checks and deliver convincing internal-looking messages that evade traditional security controls.

Microsoft 365 Exchange Online’s Direct Send was engineered to solve a practical enterprise challenge. Devices and legacy applications—including multifunction printers, scanners, building automation systems, and older line-of-business software—need to send email within corporate tenants but lack modern authentication capabilities.

Direct Send preserves critical business workflows by allowing messages from these appliances to bypass rigorous authentication and security screening.

However, this operational convenience has become an exploitable weakness. Cisco Talos reports observing increased malicious activity leveraging Direct Send for phishing campaigns and BEC attacks.

Their findings align with extensive research from leading security vendors including Varonis, Abnormal Security, Ironscales, Proofpoint, Barracuda, Mimecast, and Arctic Wolf, all documenting active corporate targeting through Direct Send exploitation in recent months.

Microsoft has acknowledged the security implications and introduced a Public Preview of the RejectDirectSend control, signaling future improvements such as Direct Send-specific usage reports and an eventual “default-off” posture for new tenants.

These enhancements aim to strengthen organizational defenses while maintaining support for the business-critical workflows Direct Send enables.

How Attackers Exploit the Trusted Pathway

Direct Send abuse represents the opportunistic exploitation of a trusted communication channel. Adversaries emulate legitimate device or application traffic, sending unauthenticated messages that appear to originate from internal accounts and trusted systems.

Research from multiple security vendors reveals recurring attack techniques that have proven effective against organizations worldwide.

Attackers frequently impersonate internal users, executives, or IT help desks, as documented by Abnormal Security and Varonis.

Business-themed social engineering lures dominate the attack landscape, including task approvals, voicemail notifications, service alerts, and wire transfer or payment prompts, with Proofpoint highlighting the sophisticated nature of these social engineering payloads.

Modern attacks incorporate obfuscation techniques designed to evade content filters. Ironscales, Barracuda, and Mimecast report observing QR codes embedded in PDFs, low-content messages, and empty-body emails carrying obfuscated attachments that bypass traditional security scanning and redirect victims to credential harvesting pages.

Perhaps most insidiously, attackers exploit trusted Exchange infrastructure and legitimate SMTP flows to inherit implicit trust, decreasing payload scrutiny.

“What happens when a feature built for convenience becomes an attacker’s perfect disguise?” Abnormal Security asks, framing the dual-use nature of Direct Send that makes it simultaneously valuable for operations and dangerous when exploited.

The Authentication Bypass Problem

The fundamental vulnerability lies in Direct Send’s exemption from standard email domain sender verification.

Three critical authentication mechanisms normally protect email recipients: DomainKeys-Identified Mail (DKIM) provides cryptographic signature verification, Sender Policy Framework (SPF) authorizes sending IP ranges, and Domain-based Message Authentication, Reporting and Conformance (DMARC) defines handling policies for noncompliant mail.

Real-world examples demonstrate the danger. Spoofed American Express dispute notifications and fake ACH payment notices—appearing as internal messages—successfully bypassed sender verification that would have flagged these threats.

Had these messages undergone DMARC, DKIM, and SPF scanning, they would have been rejected. Instead, Direct Send prevented this inspection entirely, allowing the malicious messages through.

Spoofed American Express dispute.Spoofed American Express dispute.
Spoofed American Express dispute.

This creates a challenging situation for enterprises. Many organizations maintain legitimate dependencies on Direct Send, having not yet migrated older scanning or workflow systems to authenticated submission methods or partner connectors.

 fake ACH payment notice. fake ACH payment notice.
Fake ACH payment notice.

Hasty disablement without proper visibility and change planning risks disrupting invoice processing, document distribution, or facilities notifications. Microsoft’s forthcoming reporting capabilities aim to help administrators sequence risk reduction without causing accidental business impact.

Defending Against Direct Send Abuse

With Direct Send exploitation becoming increasingly prevalent, security experts recommend a layered defense strategy. Organizations should disable or restrict Direct Send where feasible, beginning with thorough inventory of current dependencies.

Although Microsoft’s forthcoming reporting will streamline this process, administrators should immediately review internal device inventories, SPF records, and connector configurations. Once legitimate mailflows are validated, enable the RejectDirectSend control using Set-OrganizationConfig -RejectDirectSend $true.

Migration to authenticated SMTP represents the most secure long-term solution. Organizations should prefer authenticated SMTP client submission on port 587 for devices capable of storing modern credentials or leveraging app-specific identities, following Microsoft documentation.

For devices unable to use authenticated submission, deploy SMTP relays with tightly scoped source IP restrictions. Establish certificate or IP-based partner connectors for third-party services legitimately sending with accepted domains.

Strengthening authentication and alignment provides additional protection layers. Maintain SPF with required authorized sending IPs and adopt Soft Fail configuration per guidance from the Messaging, Malware and Mobile Anti-Abuse Working Group and Microsoft.

Enforce DKIM signing and monitor DMARC aggregate reports for anomalous internal-looking unauthenticated traffic that may indicate exploitation attempts.

Policy, access, and monitoring enhancements complete the defense strategy. Restrict egress on port 25 from general user network segments, ensuring only designated hosts originate SMTP traffic.

Use Conditional Access or equivalent policies to block legacy authentication paths lacking business justification. Configure alerts for unexpected internal domain messages lacking proper authentication.

As Ironscales aptly observes, “You can’t block what you don’t see,” emphasizing that visibility serves as a prerequisite to confident enforcement. These defenses layer onto Microsoft’s platform controls, reducing attacker dwell time and shortening the detection-to-remediation window as organizations work to secure this exploitable feature.

Follow us on Google NewsLinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link