Precursor’s Security Operations Centre has observed a growing trend of attackers exploiting the Direct Send feature in Microsoft 365, making phishing emails look like they were sent from trusted internal accounts.
Get Your 'Vulnerability Management Template' FREE!
Your Vulnerability Management Template Includes:
Secure your organisation today by completing the form for your Vulnerability Management Template.
Download the, 'How to secure Microsoft Office Desktop Deployments Technical Guide' - FREE
Complete the form to download your free technical guide and secure your organisation today.
Download the Cyber Essentials Template Policy Pack - FREE
Complete the form to download your FREE Cyber Essentials Template Pack today, including:
Download the Microsoft 365 Security Guide - FREE
Complete the form to download your FREE Microsoft 365 Security Guide today, including:
Sign up on the form and receive the guide instantly.
Threat actors are increasingly exploiting a feature in M365, Direct Send, this allows phishing emails to appear to come from internal users, enabling invoice, payroll and conveyancing fraud. By abusing Direct Send, attackers can bypass common email authentication controls (SPF, DKIM, DMARC) and directly drop malicious messages into inboxes, increasing the likelihood of credential theft, data loss and fraud.
Note that this is different from typical “spoofing”.
Direct Send is a feature in Microsoft Exchange Online that allows devices and applications (like scanners, multi-function printers, or business software) to send emails directly to recipients without authentication against the sending domain. While useful for business operations, this pathway can be misused if not tightly controlled.
Attackers abuse poorly secured or misconfigured Direct Send pathways to:
• Send phishing emails that appear internal – Messages seem to originate from the same corporate domain, adding credibility.
• Bypass authentication checks – Since Direct Send doesn’t enforce SPF/DKIM/DMARC, malicious emails can sneak past filtering solutions.
• Deliver malicious payloads – Often includes credential-harvesting links, fake invoice documents, or malware-laced attachments.
Precursor monitor various e-mail security appliances and solutions across various sectors and organisations in the UK & EMEA. We have observed the following subjects utilised to illicit fraud:
From further intelligence research, Precursor also highlight that this is a continued trend in a similar campaign identified by Proofpoint.
It should also be noted that Direct Send e-mails do not traverse Mimecast.
Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.
We have a CREST accredited Security Operations Centre and all of our penetration testers are CREST certified.
We are accredited to the highest of standards including CREST, ISO27001, ISO9001 and Cyber Essentials Plus.
Our experts have a combined experience of over 30 years delivering security operations to sectors such as healthcare, financial services, aerospace and more.
It’s important to know what you’re getting, what’s not included and what else is available. This starts with understanding a SOC and it’s critical functions. CREST has recently published a guide to the critical functions of a SOC which aligns with the CREST SOC standard.
Enter your details here and to get the complete guide instantly sent to your inbox.
Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.
We have a CREST accredited Security Operations Centre and all of our penetration testers are CREST certified.
We are accredited to the highest of standards including CREST, ISO27001, ISO9001 and Cyber Essentials Plus.
Our experts have a combined experience of over 30 years delivering security operations to sectors such as healthcare, financial services, aerospace and more.
Precursor Security
Welcome to Precursor Security, where the forefront of cybersecurity and penetration testing expertise meets unmatched dedication and innovation. We are the architects of robust digital defences, committed to safeguarding the online realm.