Microsoft 365: The Sextortion Scam Shuffle – How Hackers Are Dancing Past Security Filters

Sextortion emails are sneaking into inboxes via the Microsoft 365 Admin Portal, exploiting a loophole to bypass spam filters. These scams demand money, threatening to release compromising images. While Microsoft investigates, remember: if you receive one of these emails, it’s a scam. Don’t panic, just delete!

Pro Dashboard

Hot Take:

Microsoft 365: Now with 100% more sextortion email delivery! Who knew the cloud could be so… revealing? Microsoft, maybe it’s time to install a spam filter that can handle more than just the cloud’s weather updates? Nothing screams “trusted email” like a message from “[email protected]” with a side of ransomware. Move over Nigerian princes, there’s a new scam in town, and it’s got a direct line to your inbox!

Key Points:

  • Scammers are exploiting Microsoft 365 Admin Portal to send sextortion emails directly to inboxes.
  • The emails are sent through Microsoft’s legitimate “[email protected]” address.
  • Scammers bypass character limits using browser developer tools to extend message length.
  • Microsoft is investigating but hasn’t implemented server-side checks for message length.
  • Recipients are urged to recognize these emails as scams and not engage with them.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?