Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Critical cPanel Flaws Allow Access to Sensitive System
May 15, 2026
Amazon Redshift JDBC Driver Flaws Allow Remote Code Execution
May 15, 2026
Home/Threats/Hackers Exploited Routing & Misconfigurations to Spoof Or
Threats

Hackers Exploited Routing & Misconfigurations to Spoof Or

Phishing actors are exploiting complex routing scenarios and misconfigured security protections to send fake emails that appear to originate from within targeted organizations. These emails look like...

Sarah simpson
Sarah simpson
January 7, 2026 3 Min Read
18 0

Phishing actors are exploiting complex routing scenarios and misconfigured security protections to send fake emails that appear to originate from within targeted organizations.

These emails look like they were sent internally, making them harder to detect. Threat actors have used this method to deliver various phishing messages through platforms like Tycoon2FA.

The emails use common tricks, including voicemail alerts, shared documents, human resources communications, and password reset notices to steal login credentials.

This attack method has been around for a while but became more visible and widely used since May 2025. The phishing campaigns using this technique are not targeted at specific organizations but are sent widely across many industries.

Researchers also found campaigns using this method to trick companies into paying fake invoices. These attacks work differently from regular phishing because they abuse complex email routing and poorly configured security settings.

Organizations whose Microsoft Exchange mail exchanger records point directly to Office 365 are protected by built-in security features and are not affected by this attack vector.

This phishing message uses a 'password expiration' lure masquerading as a communication from Microsoft (Source - Microsoft)
This phishing message uses a ‘password expiration’ lure masquerading as a communication from Microsoft (Source – Microsoft)

Phishing emails sent this way can be more successful because they look like internal messages. Microsoft Threat Intelligence researchers noted that successful attacks can lead to stolen data or business email compromise attacks against the affected organization or its partners.

These incidents may require significant cleanup efforts and can cause financial losses in the case of invoice scams.

While Microsoft detects most of these phishing attempts, organizations can reduce their risk by properly setting up security protections and configuring third-party email connectors to prevent fake emails from reaching employee inboxes.

Technical Breakdown of Email Authentication Failures

The attacks take advantage of situations where organizations have set up complex email routing scenarios with mail exchanger records that do not point directly to Office 365.

This phishing message uses a 'shared document' lure masquerading as SharePoint (Source - Microsoft)
This phishing message uses a ‘shared document’ lure masquerading as SharePoint (Source – Microsoft)

When organizations have not configured strict security protections, threat actors can send fake phishing emails that appear to come from the organization’s own domain.

Email headers reveal important information about these spoofed messages, such as external IP addresses used by attackers to start the phishing attack.

Based on how the email system is configured, security checks like SPF will show soft or hard fail, DMARC will fail, and DKIM will equal none because both the sender and recipient appear to be in the same domain.

The X-MS-Exchange-Organization-InternalOrgSender header will be set to True, but X-MS-Exchange-Organization-MessageDirectionality will be set to Incoming and X-MS-Exchange-Organization-ASDirectionalityType will have a value of “1”, showing that the message came from outside the organization.

The combination of an internal organization sender marker and incoming direction indicates a message faked to look like internal communication.

The X-MS-Exchange-Organization-AuthAs header will be set to Anonymous, confirming that the message came from an external source.

Setting strict Domain-based Message Authentication, Reporting, and Conformance reject policies and SPF hard fail policies instead of soft fail, along with properly configuring third-party connectors, will prevent phishing attacks that try to fake organization domains.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerphishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Black Cat Hackers Use Fake Notepad++ Sites Group Install

Next Post

D-Link Router Command Injection Flaw Actively Explo

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s
May 15, 2026
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us