• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
    • AS4
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Microsoft Sicherheitslücke

Microsoft vulnerability: Phishing for Outlook and Exchange Online customers

Sören Beiler | Senior Presales System Engineer
Author: Sören BeilerSenior Presales Systems Engineer

A vulnerability at Microsoft currently makes it possible to spoof Microsoft email addresses and thus launch credible phishing attacks on Microsoft customers. Find out how you can protect yourself in our blog.

20.06.2024|Last edited:19.08.2024

The renowned security researcher Vsevolod Kokorin has discovered a vulnerability that enables attackers to spoof Microsoft email addresses and thus launch credible phishing attacks on Microsoft customers.

Outlook accounts targeted

The vulnerability specifically affects emails sent to Outlook accounts. Outlook is an email service with over 400 million users worldwide, meaning that attackers can potentially send millions of fake emails that appear trustworthy to recipients.

Microsoft has recognized the problem in the meantime

Kokorin reported the error to Microsoft. He had already informed the company of his discovery months ago, he told Techcrunch. However, the technology giant initially stated that it was unable to reproduce the problem. Finally, the security researcher published information about his discovery on X (formerly Twitter).

The technical details of the vulnerability were not published for security reasons to prevent possible misuse. Kokorin emphasized that he had not acted out of financial motives, but rather wanted to encourage companies to take security researchers seriously and work better with them.

It is not known whether anyone other than Kokorin has also discovered the vulnerability and may already be actively exploiting it.

After Microsoft initially failed to respond to Kokorin’s request for comment, Microsoft now appears to have responded. On Tuesday evening, the researcher explained on X that the company had now recognized the problem. “They have also looked at some of my older reports on emails,” he continued. However, it remains unclear when the spoofing problem will be fixed.

The vulnerability is reproducible

The NoSpamProxy security team has analyzed the vulnerability and was able to reproduce the result described by Kokorin. We also refrain from publishing the vulnerability because the risk is considerable and could have serious consequences.

We were also able to spoof other domains protected by the DMARC policy, including web.de and our own domain nospamproxy.com. As things currently stand, we assume that basically all external domains can be fished.

As we are not sure whether this is the same vulnerability, we have also forwarded a report with our findings to Microsoft.

Microsoft Phishing E-Mail

Two-phased safety concepts protect

Mistakes can of course happen. However, cases like this also show that two-phase safety concepts always offer the best possible protection: A combination of Microsoft 365 and NoSpamProxy as a mail gateway would have solved the problem from the outset, because the evaluation of the Header-From recognizes false senders and rejects or blocks the corresponding emails. NoSpamProxy customers are therefore protected from this vulnerability.

Not yet using NoSpamProxy?

With NoSpamProxy you can reliably protect your company from cyber attacks. Request your free trial version now!

Get your free NoSpamProxy trial now!
  • share 
  • share 
  • share 
  • email 

SEARCH

PRODUCT

  • All Topics
  • NoSpamProxy Cloud
  • NoSpamProxy Protection
  • NoSpamProxy Encryption
  • NospamProxy Large Files

You need support?

You can find more information about NoSpamProxy in our documentation and forum.

CATEGORY

  • All Topics
  • News
  • Product
  • Tech & Support
  • Events
RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

NoSpamProxy

  • NoSpamProxy Cloud
  • NoSpamProxy Encryption
  • NoSpamProxy Large Files
  • NoSpamProxy Disclaimer
  • Price request
  • Team
  • Career
  • General terms and conditions
  • Data Protection Information for Business Partners and Applicants
  • Cybersecurity (PSIRT)

Partners

  • Becoming a reseller
  • Partners
  • Order Certificates
  • Newsletter

Categories

  • All topics
  • News
  • Support
  • Updates
  • Order certificates

Latest News

  • Was ist ein Zero Day Exploit Preview
    What is a Zero-Day Exploit?23.04.2025 - 14:00
  • Info Icon
    UPDATE: New Google email sender guidelines: What you need to do17.04.2025 - 12:00
  • Was ist Spoofing Preview
    What is spoofing?11.04.2025 - 14:00
IMPRINT • EULA • Privacy Policy • • © 2025 Net at Work GmbH
  • Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
Link to: it-sa 2024 – Secure your free tickets now! Link to: it-sa 2024 – Secure your free tickets now! it-sa 2024 – Secure your free tickets now!it-sa 2022 Preview Link to: 10 Tips for Maximum Email Security Link to: 10 Tips for Maximum Email Security 10 Tipps für optimale E-Mail-Sicherheit Preview10 Tips for Maximum Email Security
Scroll to top Scroll to top Scroll to top