August 21, 2025

Precursor SOC detects Microsoft Direct Send Phishing

Precursor’s Security Operations Centre has observed a growing trend of attackers exploiting the Direct Send feature in Microsoft 365, making phishing emails look like they were sent from trusted internal accounts.

Get Your 'Vulnerability Management Template' FREE!‍

Your Vulnerability Management Template Includes:

  • Full Vulnerability Identification Process Documents
  • Easy to Follow Process Diagrams
  • System and Data Criticality Definitions
  • Vulnerability Triage Process
  • Remediation Allocation Process
  • Root Cause Analysis Process

Secure your organisation today by completing the form for your Vulnerability Management Template.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Download the, 'How to secure Microsoft Office Desktop Deployments Technical Guide' - FREE

  • 15 Technical Controls to help secure your users and keep your business safe.
  • 100’s of reference group policy objects to implement the controls
  • Reference material to learn more about each control

Complete the form to download your free technical guide and secure your organisation today.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Download the Cyber Essentials Template Policy Pack - FREE

Complete the form to download your FREE Cyber Essentials Template Pack today, including:

  • User Management Policy
  • Patch Management Policy
  • Mobile Device Management Policy
  • Information Security Policy
  • Device Build Policy
  • Credential Management Policy
  • Account Usage Policy
  • Registers for all of the above policies

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Download the Microsoft 365 Security Guide  - FREE

Complete the form to download your FREE Microsoft 365 Security Guide today, including:

  • A checklist to ensure your organisation is protected.
  • Top tips you can distribute to employees to keep your data safe.
  • Recommended secure configuration settings for your environment.

Sign up on the form and receive the guide instantly.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Introduction

Threat actors are increasingly exploiting a feature in M365, Direct Send, this allows phishing emails to appear to come from internal users, enabling invoice, payroll and conveyancing fraud. By abusing Direct Send, attackers can bypass common email authentication controls (SPF, DKIM, DMARC) and directly drop malicious messages into inboxes, increasing the likelihood of credential theft, data loss and fraud.

Note that this is different from typical “spoofing”.

What is Direct Send?

Direct Send is a feature in Microsoft Exchange Online that allows devices and applications (like scanners, multi-function printers, or business software) to send emails directly to recipients without authentication against the sending domain. While useful for business operations, this pathway can be misused if not tightly controlled.

How Cybercriminals Exploit It

Attackers abuse poorly secured or misconfigured Direct Send pathways to:

• Send phishing emails that appear internal – Messages seem to originate from the same corporate domain, adding credibility.

• Bypass authentication checks – Since Direct Send doesn’t enforce SPF/DKIM/DMARC, malicious emails can sneak past filtering solutions.

• Deliver malicious payloads – Often includes credential-harvesting links, fake invoice documents, or malware-laced attachments.

Subject lines Precursor SOC have observed

Precursor monitor various e-mail security appliances and solutions across various sectors and organisations in the UK & EMEA. We have observed the following subjects utilised to illicit fraud:

  • Payroll Update – MM/DD/YYYY
  • Mortgage Funds Release/MM/DD/YYYY
  • Completion Funds Transfer/MM/DD/YYYY
  • BACS Payment Authorisation/MM/DD/YYYY

From further intelligence research, Precursor also highlight that this is a continued trend in a similar campaign identified by Proofpoint.

It should also be noted that Direct Send e-mails do not traverse Mimecast.

Recommended Actions

  • Enable “Reject Direct-Send” (Review if this is required anywhere first)
    • To enable the Reject Direct Send feature,Exchange Online Administrators can run the following PowerShell:
      • § Set-OrganizationConfig -RejectDirectSend $true
  • Enforce email authentication (SPF, DKIM, DMARC)with strict DMARC reject and SPF hard fail policies.
  • Review if your e-mail security solution has visibility of Direct Send e-mails.
  • Monitor for suspicious email subject lines and escalate awareness of fraud e-mails.

Ready for a true 24x7 cyber risk management solution from a CREST-Accredited SOC?

Get Your CREST 'What is a Security Operations Centre?' Guide!

It’s important to know what you’re getting, what’s not included and what else is available. This starts with understanding a SOC and it’s critical functions. CREST has recently published a guide to the critical functions of a SOC which aligns with the CREST SOC standard.

Enter your details here and to get the complete guide instantly sent to your inbox.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Why choose us?

Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.

Written by

Precursor Security

Welcome to Precursor Security, where the forefront of cybersecurity and penetration testing expertise meets unmatched dedication and innovation. We are the architects of robust digital defences, committed to safeguarding the online realm.

menu