Threat actors are bypassing security measures by taking advantage of complex email routing and weak spoofing protections to send fraudulent messages that appear to originate from within a victim's own organization. By utilizing phishing-as-a-service platforms like Tycoon2FA, these attackers successfully deceive employees into providing credentials and bypassing multi-factor authentication through realistic internal lures.
Cybercriminals have increasingly targeted organizations by exploiting vulnerabilities in email configuration and domain authentication. These attackers focus on environments where routing scenarios are complex, allowing them to send phishing emails that superficially appear to be internal communications. By masquerading as a trusted internal source, these messages have a much higher success rate in tricking recipients into clicking malicious links or revealing sensitive information.
Microsoft recently highlighted that these opportunistic campaigns are frequently powered by phishing-as-a-service platforms such as Tycoon2FA. These platforms provide threat actors with the tools necessary to execute sophisticated adversary-in-the-middle attacks, which can bypass standard multi-factor authentication. The lures used in these schemes often revolve around common corporate themes including human resources updates, voicemail notifications, shared documents, and urgent password reset requests.
The vulnerability primarily exists in Office 365 tenants where the mail exchange records are not pointed directly to the service or where third-party connectors are improperly configured. When an organization's routing is fragmented, it creates gaps that allow spoofed messages to bypass traditional filters. Organizations that do not have their mail exchange records correctly aligned are at a significantly higher risk for business email compromise and financial fraud.
To mitigate these risks, security experts emphasize the importance of strict domain authentication policies. Implementing a hard fail for the sender policy framework and a reject policy for domain-based message authentication, reporting, and conformance is essential. These strict settings ensure that any email failing the authentication check is blocked entirely rather than simply being flagged or delivered to a junk folder.
While organizations with properly configured records and strict policies remain protected, many remain vulnerable due to legacy settings or complex network architectures. Beyond technical configurations, attackers continue to refine their methods by matching the sender and recipient addresses to further enhance the illusion of legitimacy. Regular audits of email connectors and authentication protocols are necessary to prevent these spoofing tactics from resulting in credential theft or significant financial loss.
Source: Misconfigured Email Routing Allows Internal Spoofed Phishing Attacks


