This phishing campaign spoofs internal messages: here’s what we know


  • Misconfigured email servers allow attackers to spoof domains and bypass SPF, DKIM, and DMARC checks.
  • Phishing emails imitate internal messages using kits like Tycoon2FA with HR or voicemail themes
  • Stolen credentials fuel Business Email Compromise (BEC) secondary attacks in broad, untargeted campaigns.

Cybercriminals abuse email server misconfigurations to send highly convincing phishing emails and trick victims into sharing their login credentials and other secrets. This is according to Microsoft, which in a recent report stated that this practice is not new, but that it has become more popular during the second half of 2025.

In the document, Microsoft explains that scammers are taking advantage of the way some companies route emails and configure their security controls. Normally, email systems use checks like SPF, DKIM, and DMARC to confirm that a message actually comes from the organization it claims to come from.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top