This phishing campaign fakes internal messages: here’s what we know



  • Misconfigured email servers allow attackers to spoof domains and bypass SPF, DKIM, and DMARC checks.
  • Phishing emails mimic internal messages using kits like Tycoon2FA with HR or voicemail themes.
  • Stolen credentials fuel secondary business email compromise (BEC) attacks on broad, untargeted campaigns

Cybercriminals are abusing misconfigurations on email servers to send highly convincing phishing emails and trick victims into sharing their login credentials and other secrets. This is according to Microsoft who, in a recent report, said the practice is not new, but became more popular in the second half of 2025.

In the document, Microsoft explained that criminals are taking advantage of how some companies route email and how they configure their security controls. Typically, email systems use checks such as SPF, DKIM, and DMARC to confirm that a message actually comes from the organization it claims to come from.



Leave a Comment

Your email address will not be published. Required fields are marked *