Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical WordPress Plugin Flaw Allows Authentication Bypass Attacks
May 18, 2026
Fast16 Malware Sabotaged Nuclear Weapons Simulation Data
May 18, 2026
Claude Code RCE Flaw: Execute Commands Lets Attackers
May 18, 2026
Home/CyberSecurity News/Exchange Online Misflags Legitimate Customer Emails as Phishing
CyberSecurity News

Exchange Online Misflags Legitimate Customer Emails as Phishing

Microsoft Exchange Online is currently grappling with a service degradation that’s incorrectly flagging legitimate customer emails as phishing, leading to their quarantine and disrupting...

Emy Elsamnoudy
Emy Elsamnoudy
February 9, 2026 2 Min Read
6 0

Microsoft Exchange Online is currently grappling with a service degradation that’s incorrectly flagging legitimate customer emails as phishing, leading to their quarantine and disrupting critical communications. Identified as EX1227432, this ongoing problem began on February 5, 2026, at 10:31 AM EST.

Microsoft classifies this as an incident affecting Exchange Online, with some users unable to send or receive emails normally. Legitimate messages are being marked as phishing due to overly aggressive detection criteria designed to counter sophisticated spam and phishing tactics. A new URL rule is the culprit, mistakenly identifying safe URLs as malicious, leading to quarantines.

Affected users see their inbound and outbound emails trapped in quarantine, impacting productivity across organizations relying on Exchange Online.

The scope targets specific email messages with flagged URLs, though Microsoft has not detailed affected regions or customer numbers. Administrators report needing manual releases, with some previously quarantined messages now delivering after Microsoft’s interventions.

The company is actively reviewing quarantined messages and unblocking legitimate URLs to restore service. Updates over the weekend confirmed progress, with full remediation targeted soon and an estimated resolution time forthcoming.

Microsoft urges affected users to monitor the Microsoft 365 admin center for status on EX1227432.

This is not isolated; Exchange Online has faced repeated false positives. In May 2025, a machine learning model wrongly tagged Gmail emails as spam (EX1064599).

In March, anti-spam systems quarantined legitimate messages, while in September 2025, bugs blocked URLs in emails and Teams. Earlier cases involved bit.ly links and attachments triggering high-confidence phishing flags.

Cybersecurity forums buzz with frustration over Exchange’s anti-phishing policies, which override whitelists for high-confidence detections. Users on Reddit report persistent issues since 2022, often requiring support tickets for backend fixes.

Sysadmins note patterns like DMARC-lacking senders with attachments or image-heavy signatures triggering quarantines.

As phishing evolves, Microsoft’s ever-updating defenses risk overreach, balancing security against usability. This incident underscores the challenges of AI-driven email filtering amid rising threats like spoofed internals. Organizations are advised to report false positives via quarantine tools and consider third-party filters for redundancy.

In a statement, Microsoft emphasized ongoing improvements to prevent recurrence, though no timeline for full fixes exists yet. Customers should check quarantines regularly and avoid bypassing policies, as high-confidence phishing ignores most overrides.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

CybersecurityphishingSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

DKIM Replay Attacks Target Apple & PayPal Invoice Hackers Exploit

Next Post

Critical 0-Click RCE in Claude Desktop Extensions Ex

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us