Microsoft 365: The Sextortion Scam Shuffle – How Hackers Are Dancing Past Security Filters
Sextortion emails are sneaking into inboxes via the Microsoft 365 Admin Portal, exploiting a loophole to bypass spam filters. These scams demand money, threatening to release compromising images. While Microsoft investigates, remember: if you receive one of these emails, it’s a scam. Don’t panic, just delete!

Hot Take:
Microsoft 365: Now with 100% more sextortion email delivery! Who knew the cloud could be so… revealing? Microsoft, maybe it’s time to install a spam filter that can handle more than just the cloud’s weather updates? Nothing screams “trusted email” like a message from “[email protected]” with a side of ransomware. Move over Nigerian princes, there’s a new scam in town, and it’s got a direct line to your inbox!
Key Points:
- Scammers are exploiting Microsoft 365 Admin Portal to send sextortion emails directly to inboxes.
- The emails are sent through Microsoft’s legitimate “[email protected]” address.
- Scammers bypass character limits using browser developer tools to extend message length.
- Microsoft is investigating but hasn’t implemented server-side checks for message length.
- Recipients are urged to recognize these emails as scams and not engage with them.
Already a member? Log in here