Threat Alert: Microsoft 365 “Direct Send” Abused in New Phishing Campaigns
Researchers have identified a new phishing technique that leverages Microsoft 365's Direct Send feature. This method allows attackers to send internal-looking emails-without account compromise-bypassing traditional email defenses and appearing legitimate to unsuspecting users. What is Direct Send? Direct Send is a legitimate feature in Microsoft 365 that allows devices like printers and scanners to send emails directly through Microsoft infrastructure without authentication. Emails are routed via a tenant-specific smart host URL (e.g., tenantname.mail.protection.outlook.com). Originally designed for internal communications, this feature allows unauthenticated devices to send mail to internal recipients. Unfortunately, this same capability can be abused. With basic information about a target organization's domain and email structure, attackers can spoof internal addresses and deliver phishing emails that appear trusted. How Attackers are Exploiting It Starting in May 2025, attackers have been using Direct Send to distribute phishing emails that closely mimic internal communications. These emails often contain PDF attachments with…
