Microsoft 365’s “Direct Send” Under Siege: Phishing Campaigns Exploit Security Loophole
A phishing campaign abuses Direct Send in Microsoft 365 to bypass security and steal credentials. It’s like a sneaky printer sending emails pretending to be your boss! This exploit targets financial, manufacturing, and healthcare sectors. Disable Direct Send or risk becoming the punchline in a hacker’s joke.

Hot Take:
Who knew that printers and scanners could have a side hustle in phishing? Thanks to Microsoft 365’s “Direct Send,” our office gadgets are moonlighting as cybercriminal accomplices, making our emails look as legitimate as a forged Mona Lisa. Maybe it’s time to give those printers a stern talking-to or at least a firmware update!
Key Points:
- Microsoft 365’s “Direct Send” is being exploited in a phishing campaign.
- The feature allows emails to appear internal without authentication.
- Varonis identified over 70 organizations targeted, mostly in the U.S.
- Phishing emails spoof voicemail notifications with QR codes leading to fake login pages.
- Mitigation includes disabling Direct Send and tightening email security policies.
Already a member? Log in here