Threat Alert: Microsoft 365 “Direct Send” Abused in New Phishing Campaigns

Researchers have identified a new phishing technique that leverages Microsoft 365's Direct Send feature. This method allows attackers to send internal-looking emails-without account compromise-bypassing traditional email defenses and appearing legitimate to unsuspecting users. What is Direct Send? Direct Send is a legitimate feature in Microsoft 365 that allows devices like printers and scanners to send emails directly through Microsoft infrastructure without authentication. Emails are routed via a tenant-specific smart host URL (e.g., tenantname.mail.protection.outlook.com). Originally designed for internal communications, this feature allows unauthenticated devices to send mail to internal recipients. Unfortunately, this same capability can be abused. With basic information about a target organization's domain and email structure, attackers can spoof internal addresses and deliver phishing emails that appear trusted. How Attackers are Exploiting It Starting in May 2025, attackers have been using Direct Send to distribute phishing emails that closely mimic internal communications. These emails often contain PDF attachments with…

0 Comments

Urgent: On-Prem SharePoint Vulnerability CVE‑2025‑53770 (ToolShell) – What You Need to Know

Summary Microsoft has confirmed active exploitation of a critical on-premises SharePoint vulnerability, CVE‑2025‑53770-a variant of the previously identified CVE‑2025‑49706. This vulnerability allows unauthenticated remote code execution (RCE) on SharePoint servers. While SharePoint Online (Microsoft 365) is not affected, organizations using SharePoint Server 2016, 2019, and Subscription Edition are at immediate risk. At the time of this post, no official patch is available. Microsoft has issued interim mitigation guidance. What You Need to Know The vulnerability has been assigned a CVSS score of 9.8 (Critical). Exploits are being observed in the wild. Victims include public sector, education, and private industry servers globally. The exploit method, named "ToolShell" by researchers, involves a chain of vulnerabilities that allow attackers to gain full control of servers without authentication. Attackers exploit public-facing SharePoint servers using crafted requests that trigger deserialization flaws, ultimately installing web shells such as spinstall0.aspx to maintain persistent access. Microsoft's Guidance Microsoft…

0 Comments

Critical Path Security and Ryan Vargas Charge Through Back-to-Back NASCAR Canada Series Battles

Two races. Four days. And a lot to prove. Critical Path Security proudly backed Ryan Vargas as he took on the challenging west coast swing of the NASCAR Canada Series, racing in both Edmonton and Saskatoon within just four days. And Ryan delivered. In Edmonton, Vargas showed impressive pace, battling within the top five for much of the race. After a late-race incident set him back, he fought hard to salvage a 6th-place finish - an effort that moved him up to 5th in the overall driver point standings. Rolling into Saskatoon, Ryan and the team were determined to keep momentum on their side. Starting 7th, he methodically worked through the field, eventually battling with his teammate, team owner, and former series champion DJ Kennington. At the checkered flag, Ryan secured a solid P5 finish, retaining his Top-5 position in the season standings. We're proud to stand alongside Ryan as…

0 Comments

Lock It Down: How AT&T’s Account Lock Feature Raises the Bar Against SIM Swap Attacks

Introduction SIM swapping-also known as SIM jacking-continues to enable attackers to hijack phone numbers, intercept two-factor codes, and compromise everything from email accounts to crypto wallets. AT&T's new Wireless Account Lock is a long-overdue, critical layer of protection, designed to close off one of the most exploited social engineering attack paths. For customers of AT&T, Critical Path Security recommends immediate activation of this feature and incorporating it into mobile security strategies. What AT&T's Wireless Account Lock Does This new feature allows AT&T customers to proactively prevent key account changes, including: SIM and eSIM swaps Phone number transfers Billing address or payment info edits Addition or removal of authorized users Upgrades or purchases billed to the account Accessible via the myAT&T app or website, this lock can only be toggled by the account owner or designated secondary users. Notifications are sent whenever the feature is enabled or disabled, serving as a…

0 Comments