This phishing campaign spoofs internal messages – here’s what we know



  • Misconfigured email servers let attackers spoof domains and bypass SPF, DKIM, and DMARC checks
  • Phishing emails mimic internal messages using kits like Tycoon2FA with HR or voicemail themes
  • Stolen credentials fuel secondary Business Email Compromise (BEC) attacks across broad, non-targeted campaigns

Cybercriminals are abusing misconfigurations in email servers to send highly convincing phishing emails and trick victims into sharing login credentials and other secrets. This is according to Microsoft who, in a recent report, said the practice isn’t new, but it did grow more popular in the second half of 2025.

In the paper, Microsoft explained that crooks are taking advantage of how some companies route email and how they set up their security checks. Normally, email systems use checks like SPF, DKIM, and DMARC to confirm that a message really comes from the organization it claims to be from.


https://cdn.mos.cms.futurecdn.net/CT482eMSRL8PagRtuBVYNd-2000-80.jpeg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img