• Thread Author
Hackers are increasingly exploiting one of Microsoft 365’s lesser-known conveniences—Direct Send—to launch sophisticated phishing campaigns that closely mimic internal communications, putting even well-defended organizations at serious risk. As recent research from Varonis and corroborating cybersecurity sources shows, this threat vector has evolved rapidly since its discovery in May 2025, with over 70 U.S. organizations already targeted using highly effective techniques designed to evade standard defenses. Understanding how these attacks work, the weaknesses of the Direct Send feature, and the layered mitigation strategies available is now crucial for any business relying on Microsoft 365 for email and collaboration.

A digital security server surrounded by QR codes and a lock, symbolizing data protection and cybersecurity.What Is Microsoft 365 Direct Send, and Why Was It Built?​

First introduced as a productivity feature within Exchange Online, Direct Send enables devices and applications without mailbox accounts—think network printers, scanners, monitoring tools, or legacy business systems—to deliver emails via the Microsoft 365 ecosystem. Unlike SMTP AUTH or other authentication-reliant methods, Direct Send uses the Office 365 SMTP relay (smtp.office365.com) on port 25 and requires only that email be sent from a customer-owned domain, with a secure TLS connection. This eliminates the need to embed usernames and passwords in embedded devices or apps, reducing the administrative burden and attack surface associated with credential exposure.
Microsoft describes this as a time-saving and secure way to move away from unauthenticated, legacy on-premises relays, with convenience as a primary design goal. However, this convenience has also laid the groundwork for the abuse observed by security professionals today.

Anatomy of the New Phishing Attack: How Direct Send is Being Exploited​

According to a new report from cybersecurity firm Varonis, attackers have developed a method to exploit Direct Send—one that preys on both its trust model and technical design. Here’s how the campaign typically unfolds:
  • Initial Compromise: The attacker obtains access to a Microsoft 365 account within the target organization. This can be via compromised credentials, third-party breaches, or other intrusion vectors.
  • Domain Enumeration: Attackers identify the organization's legitimate domain and locate valid recipient email addresses.
  • PowerShell Abuse: Using PowerShell scripts, the adversary crafts emails that appear to come from trusted internal sources. The Direct Send feature delivers these messages through Microsoft’s own mail infrastructure, lending them additional legitimacy.
  • Bypassing Controls: Because these emails are technically internal—sent via the organization’s tenant—they evade most external phishing filters, DMARC checks, and behavioral controls.
  • Sophisticated Lures: The phishing emails are commonly disguised as urgent internal communications, such as voicemail messages, IT alerts, or urgent HR notifications. One campaign cited by Varonis included PDF attachments sporting QR codes. When scanned, users were taken to realistic Microsoft 365 login pages controlled by the attackers—designed to capture user credentials with high success rates.
  • Stealth Operations: Forensics revealed attackers leveraging unusual tactics, including having users “send emails to themselves” using PowerShell, greatly complicating detection for security teams.
Notably, Varonis observed that in some incidents, alerts were tripped not by suspicious login activity, but by email events originating in unexpected geolocations—such as a Ukrainian IP address—yet with no traditional authentication attempts, highlighting the stealthy nature of the abuse.

Why Direct Send Phishing Works: The Technical Weaknesses​

Direct Send was intended to reduce security risk by removing password requirements from non-interactive devices. Yet in so doing, it introduced new soft spots:
  • Internal Trust: Because messages are routed through Microsoft 365’s own SMTP servers, they inherit implicit trust within the organization’s own Exchange infrastructure. Many common anti-phishing mechanisms treat such mail as low risk.
  • Control Bypass: Security tools often focus on scanning or filtering email at the boundary—between external and internal networks. In this abuse case, phishing mail never crosses an external boundary; it originates and terminates internally.
  • DMARC and SPF Challenges: Direct Send leverages the customer’s own domain. If mail is sent from a valid tenant address and correct sender domain, traditional DMARC and SPF checks (intended to catch domain spoofing from external senders) may pass or be outright bypassed.
  • Lack of Authentication Logging: Because Direct Send doesn’t require a login for mail generation, many security tools see no associated authentication event, only outbound email delivery—making correlation and detection much more difficult.

Real-World Incidents: How Organizations Are Being Targeted​

Since May 2025, at least 70 organizations in the United States—spanning healthcare, financial services, manufacturing, and education—have been confirmed as victims of this novel phishing wave, per Varonis. While individual case details are scarce due to ongoing investigations, several high-level trends have emerged:
  • Internal-Looking Spoofs: Emails are crafted to look like routine service alerts or messages from IT—sometimes as voicemail notifications, or messages urging quick responses about HR or payroll.
  • Technically Valid Emails: Because the emails pass through Microsoft’s own sending infrastructure, they often evade detection even by advanced email filtering solutions used by enterprises.
  • Attachment and QR Phishing: Beautifully formatted PDF attachments, sometimes personalized, carry QR codes intended to funnel users straight to phishing websites, often hosted on rapidly rotating domains that closely mimic official Microsoft login pages.
  • Minimal Evidence: Security teams find few if any authentication logs. The only clue may be an anomalous burst of internal email from a device located in an unexpected country, such as the Ukraine example cited by Varonis.
Multiple cybersecurity news outlets and independent research agree on the nature and effectiveness of this method. While Microsoft has not issued a formal security advisory about Direct Send abuse as of June 2025, guidance has emerged from leading security vendors, further validating the scale of this threat.

Defensive Strategies: Mitigating Direct Send Exploits​

With attackers actively leveraging Microsoft’s mail infrastructure against organizations, the question for IT administrators becomes: How do you neutralize Direct Send as a phishing vector without losing its intended productivity benefits?
Based on recommendations from Varonis, industry best practices, and verification from multiple trusted cybersecurity guides, the following layered strategies stand out:

1. Review and Harden Direct Send Usage

  • Enable “Reject Direct Send”: In the Exchange Admin Center, administrators can enable this control to block Direct Send where not explicitly required. Limiting its scope or disabling it can close the door on abused workflows while preserving legitimate uses for trusted devices.
  • Inventory Connected Devices: Audit which internal apps and devices use Direct Send. Remove unnecessary tokens and replace old workflows with modern, authenticated methods wherever possible.

2. Strengthen Email Authentication Controls

  • Strict DMARC, SPF, and DKIM: Set DMARC policies to quarantine or reject emails that fail alignment. Update SPF records to permit only static, trusted IPs to send on behalf of your domain. Sign outbound mail with DKIM to improve validation and detection of spoofed messages.
  • Restrict Allowed Senders: Limit the IP addresses or hostnames permitted to use your Microsoft 365 SMTP smart host, either via Exchange connectors or firewall rules. This minimizes the potential for lateral movement if one device is compromised.

3. Anomaly Detection and Alerting

  • Flag Internal-From-External: Set up alerting rules that tag or block emails appearing to come from internal addresses but originated from unfamiliar or external IP addresses. This targets the exact abuse pattern identified by recent threats.
  • Monitor Unusual Geolocations: Use security tools capable of detecting when internal messages are sent from new or unexpected geographic locations.

4. Regular Security Hygiene and Audits

  • Review Email Settings: Periodically audit all Exchange connectors, transport rules, and admin configurations for risky or unnecessary permissions.
  • Enforce MFA and Conditional Access: Require multifactor authentication for all accounts, especially for those with admin privileges or delegation rights. Use conditional access policies to restrict usage of mail features from unfamiliar locations or devices.
  • Continuous Employee Training: Because phishing tactics quickly evolve, ongoing security awareness training is vital, so users know to avoid opening strange attachments—even if the message looks internal—and to report suspicious emails promptly.

5. Leverage Advanced Email Security Solutions

  • Deploy Behavioral Analysis Tools: Modern security platforms, such as Microsoft Defender for Office 365 and Varonis, now offer behavioral analytics that can highlight unusual email patterns, even those originating internally.
  • Sandbox Attachments: Route unusual attachments, such as PDFs or those containing QR codes, through sandboxing solutions that can detect malicious intent before delivery.

A Deceptively Simple Threat With Major Implications​

The technical subtlety and social engineering strength of the Direct Send phishing campaign underscore the necessity of defense-in-depth and regular review of even trusted features in widely used platforms like Microsoft 365. It also highlights the persistent challenge of balancing productivity and security: features designed to streamline internal processes can inadvertently become attack vectors when assumptions about trust are no longer valid.
Security teams must reject the idea that “internal” equals “safe.” The boundary between trusted and untrusted in cloud-centric environments is blurred; attackers can and do operate from within. Focusing only on blocking external threats is no longer sufficient—internal privilege and feature abuse can be just as devastating, and often more difficult to detect.

Future Risks and What Comes Next​

With threat actors now proven to use Microsoft 365’s own infrastructure to deliver undetectable phishing emails, the potential for further automation and scaling of such attacks grows. Here’s what organizations should anticipate as the landscape develops:
  • Automation at Scale: Open-source PowerShell tools and instructions for abusing Direct Send could proliferate, making it easier for even less skilled attackers to replicate the tactic.
  • Cross-Tenant Campaigns: As organizations interconnect through shared resources, malicious internal mail may traverse between business partners, making attribution and containment harder.
  • Further Feature Abuse: Attackers may identify and exploit additional Office 365 features with similar trust or authentication loopholes.
Enterprises relying on Microsoft 365 cannot rely on default settings or a “set-it-and-forget-it” mentality. Defensive controls, alerting, and ongoing review must become a continuous process—not a one-time checklist item.

Critical Strengths and Weak Points: A Security Analyst’s View​

Strengths of Microsoft 365 Direct Send​

  • Simplicity for Device Integration: By design, Direct Send enables fast, reliable email workflow for devices and software that lack mailbox accounts, without passwords that can be stolen or leaked.
  • Reduced Exposure With Proper Controls: When implemented with strict sender restrictions, device inventory, and regular review, Direct Send remains a practical tool for low-risk email tasks.

Risks and Weaknesses​

  • Implicit Trust Model: The platform’s assumption that mail generated within a tenant is “safe” creates blind spots and is now disproven by real-world abuse.
  • Complexity in Detection: Lack of authentication logging and traditional anti-phishing markers means many legacy and even modern detection tools miss malicious mail sent via Direct Send.
  • Potential for Rapid Weaponization: Widespread adoption of Office 365 means a new attack technique, once proven, can be leveraged against hundreds of thousands of targets with little overhead.
Notably, the effective use of PowerShell and readily available attack infrastructure illustrates the dual-edged nature of offering flexible IT features in cloud environments; today’s convenience can be tomorrow’s crisis without vigilance and adaptation.

Take Action Today: Concrete Steps for Windows Administrators​

Every organization using Microsoft 365—no matter its size or industry—should take proactive steps in light of recent Direct Send abuses:
  • Audit Your Direct Send Usage: Review all devices and services that currently use Direct Send and evaluate whether they can transition to authenticated protocols.
  • Lock Down Permissions: Apply the principle of least privilege; restrict access to SMTP relay and minimize which users, devices, or IPs can send via Microsoft’s infrastructure.
  • Educate End Users: Train users not to trust the apparent source of an email simply because it looks internal, and to be cautious with unexpected attachments or embedded QR codes—even from “themselves.”
  • Monitor and Alert: Set up rules and dashboards to detect internal mail from unusual origins. Enable advanced hunting features if available in your security stack.
  • Keep Policies Up to Date: As Microsoft and the security community react to this new vector, keep an eye on updated best practices, patches, and threat intelligence feeds.

Conclusion: Rethinking Trust in Microsoft 365 and Cloud Email​

The latest wave of phishing attacks exploiting Microsoft 365’s Direct Send feature is a wake-up call: in cloud-first environments, old assumptions about internal vs. external threats no longer hold. By manipulating features intended for convenience and trusted infrastructure status, attackers can worm through enterprise defenses using little more than a compromised account, PowerShell access, and social engineering skills.
Mitigating these threats requires a reexamination of security baselines, stronger authentication, regular review of permissions and policies, and the intelligent use of both technical and educational controls. Organizations that move quickly to disable or restrict Direct Send, augment internal detection, and block anomalous activity will be well placed to withstand this next generation of phishing attacks.
Vigilance, automation, and a clear-eyed approach to trust should define your security response, not just for Direct Send, but for every productivity feature in your cloud environment. The attackers won’t wait—and neither should you.

Source: Petri IT Knowledgebase Microsoft 365 Direct Send Letting Hackers Steal Credentials
 

Back
Top