Microsoft 365 Direct Send Exploit Exposes Significant Email Security Risks

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

A feature in Microsoft 365 Exchange Online, known as Direct Send, is being actively exploited by malicious actors to conduct phishing campaigns and business email compromise (BEC) attacks. Direct Send is designed to allow legacy devices and applications, such as multifunction printers and scanners that cannot properly authenticate, to send emails within a tenant. 

However, its ability to bypass standard security and authentication checks makes it a prime target for abuse.

Understanding the Inherent Email Security Risks

Security researchers have observed a significant increase in Microsoft 365 Direct Send abuse, where attackers emulate device traffic to send unauthenticated messages that appear to originate from trusted internal accounts.

Spoofed American Express dispute (left), fake ACH payment notice (right)
Spoofed American Express dispute (left), fake ACH payment notice (right) | Source: Talos Intelligence 

The primary risk associated with Direct Send is that it creates a trusted channel that bypasses critical sender verification protocols, the Talos Intelligence security report said.

Standard email security relies on a combination of Sender Policy Framework (SPF), DomainKeys-Identified Mail (DKIM), and Domain-based Message Authentication, Reporting and Conformance (DMARC) to validate a sender's identity. 

Because Direct Send is intended for unauthenticated traffic, messages sent through this channel are not subjected to these checks. 

This allows attackers to craft phishing attacks that impersonate internal users, executives, or IT help desks with a high degree of success, as the malicious emails are implicitly trusted by the receiving infrastructure. 

Lures often include fake payment notices, task approvals, or QR codes leading to credential harvesting pages.

Cybersecurity Best Practices for Mitigation

In response to the growing threat, Microsoft has introduced new controls, including a RejectDirectSend setting, and plans to disable the feature by default for new tenants in the future. 

Organizations are advised to take immediate action to mitigate these email security risks. Key recommendations include:

Implementing robust monitoring to alert on unexpected internal domain messages that lack proper authentication is also a critical step in strengthening defenses against this attack vector.

In other recent news, security researchers spotlighted evolving phishing campaigns that deliver HoldingHands malware across China, Taiwan, Japan, and Malaysia.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: