Scammers send phishing emails from official Microsoft address
Phishing operators have exploited a vulnerability in Microsoft’s email notification systems to send fraudulent messages from a legitimate internal address used for security alerts and authentication codes. The abuse involves the address msonlineservicesteam@microsoftonline.com, which normally delivers two-factor authentication codes and account notifications to hundreds of millions of users worldwide. The misuse gives attackers a powerful way to bypass user suspicion by appearing as trusted system communication.
The attack appears to rely on creating or compromising Microsoft accounts and leveraging them to trigger automated system emails that carry fraudulent content. In some cases, attackers replicate security alerts warning of unauthorized transactions. In others, messages direct users to external links embedded in the email body. Because the messages originate from a legitimate Microsoft-controlled infrastructure, they often pass basic authentication checks and appear authentic to recipients.
Security researchers have also documented related techniques involving Microsoft’s identity management system, where attackers manipulate tenant configuration fields to inject deceptive text into automated notifications. This method can alter subject lines and message content in system-generated emails, including fake purchase confirmations or cryptocurrency-related alerts. The result is a hybrid form of phishing where legitimate infrastructure is used to generate convincing fraudulent communications at scale.
A cybersecurity monitoring group has reported that the same Microsoft notification address has been abused for months to distribute spam and phishing messages. The group has flagged the issue to Microsoft and warned that such levels of customization in automated notification systems create structural risks for abuse. Microsoft has acknowledged inquiries but has not publicly detailed corrective measures. The incident reflects a broader trend in which attackers increasingly target trusted enterprise communication systems rather than relying on external spoofed domains. Users are advised to avoid clicking links in unexpected security emails and to verify account activity directly through official platforms.
-
17:00
-
16:45
-
16:30
-
16:20
-
16:15
-
16:00
-
15:55
-
15:55
-
15:45
-
15:36
-
15:30
-
15:25
-
15:15
-
15:15
-
15:06
-
15:00
-
14:45
-
14:41
-
14:30
-
14:30
-
14:15
-
14:13
-
14:00
-
13:52
-
13:45
-
13:40
-
13:30
-
13:15
-
13:00
-
12:45
-
12:30
-
12:15
-
12:00
-
11:50
-
11:45
-
11:30
-
11:30
-
11:16
-
11:15
-
11:00
-
10:53
-
10:45
-
10:44
-
10:31
-
10:30
-
10:17
-
10:15
-
10:03
-
10:00
-
09:56
-
09:45
-
09:34
-
09:30
-
09:15
-
09:15
-
09:00
-
08:52
-
08:45
-
08:31
-
08:30
-
08:18
-
08:15
-
08:00
-
07:52
-
07:45
-
07:40
-
07:31
-
07:24
-
07:20
-
07:02
-
07:00