Phishing Spree Uses Routing Flaws to Spoof Internal Domains.

Tycoon 2FA phishing exploits complex mail routing to spoof internal emails—enforce DMARC/SPF and fix connectors

  • Attackers use complex mail routing and weak spoof protections to send emails that appear to come from inside an organization.
  • Phishing-as-a-service kits, notably Tycoon 2FA, power many of these campaigns; over 13 million linked messages were blocked in October 2025.
  • Scams include credential theft and invoice fraud with forged invoices, W-9 forms, and fake bank letters.
  • Organizations should enforce strict email authentication (DMARC reject, SPF hard fail) and correctly configure third-party connectors and Direct Send settings.

First paragraph: The Microsoft Threat Intelligence team said attackers have exploited complex mail routing and misconfigured spoof protections since May 2025 to send phishing messages that look internal, targeting organizations across industries (said). These messages aim to capture credentials and enable follow-on activity including data theft and business email compromise.

- Advertisement -

Threat actors delivered lures such as voicemails, shared documents, HR notices, and password resets using phishing-as-a-service (PhaaS) platforms. "Threat actors have leveraged this vector to deliver a wide variety of phishing messages related to various phishing-as-a-service (PhaaS) platforms such as Tycoon 2FA," the team noted, linking many campaigns to the Tycoon 2FA kit (analysis, overview). Microsoft blocked more than 13 million malicious emails tied to the kit in October 2025.

The threat exploits setups where a tenant’s MX record points to an on-premises Exchange server or a third-party service before reaching Office 365. In such cases, spoof protections can fail and attackers can send emails with the same address in the "To" and "From" fields to increase trust. Phishing messages have also impersonated services like DocuSign or HR communications and included attachments or QR codes to push victims to phishing pages.

Financial scams often mimic exchanges among a CEO, accounting, or a vendor and include three attachments: a fake invoice, an IRS W-9 form, and a counterfeit bank letter. "They may employ clickable links in the email body or QR codes in attachments or other means of getting the recipient to navigate to a phishing landing page," the report added.

Defenses recommended include enforcing strict DMARC reject and SPF hard-fail policies (DMARC, SPF guidance), and properly configuring third-party connectors (how to manage mail flow). Tenants with MX records pointed directly to Office 365 are not vulnerable to this vector, and organizations are advised to turn off Direct Send when not needed and to reject spoofed emails. Additional context on rising PhaaS activity is available from industry posts (Trellix, Cybersecurity-101/topic/phishing-as-a-service”>Huntress).

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Crypto VC Inflows Hit $1.4B Through Early 2026

Institutional and venture capital commitments to crypto companies reached $1.4 billion at the start...

Brazil Sells $61B in US Treasuries, Buys Gold in 2026

Brazil sold $61 billion in U.S. Treasury securities in 2026, using the proceeds to...

U.S. Sanctions Crypto Exchanges Aiding Iran’s Regime

The U.S. Treasury Department has, for the first time, sanctioned entire cryptocurrency exchanges under...

US sanctions crypto exchanges tied to Iran in first move

The U.S. Treasury sanctioned two UK-registered crypto exchanges for the first time under its...

ShinyHunters Expand Saas Attacks with Vishing Campaign

Google's Mandiant reported a surge in advanced voice phishing attacks by the ShinyHunters group,...
- Advertisement -

Must Read

The Ultimate Guide on How to Understand a Cryptocurrency White Paper

Today, cryptocurrency is a popular buzzword. We hear about it on the news, we read about it on the Internet. Yet, people are reluctant to...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!