Varonis Incident Response: Stopping Microsoft 365 Direct Send Abuse 

Learn how Varonis Threat Labs uncovered a critical Microsoft 365 Direct Send exploit, and how organizations leveraged Varonis Incident Response to protect themselves from attack. 
2 min read
Last updated August 5, 2025
Microsoft 365 Direct Send Attacks

Recently, Varonis Threat Labs uncovered an attack that used Microsoft 365’s Direct Send feature to phish sensitive information from the employees at more than 70 organizations. 

Microsoft 365 Direct Send is designed to allow internal devices like printers to send emails without authentication. Threat actors abused this feature to spoof internal users and deliver phishing emails without ever needing to compromise an account. 

Varonis Threat Labs uncovered the exploit in June. Armed with that intelligence, the Varonis Incident Response team proactively searched for indications that customers had been affected and remediated the threats. 

In this article, we'll dive into how Varonis Incident Response team helped stop attackers affected by the phishing campaign before a breach could occur. 

Notifying customers of high-risk activity 

In one example, Varonis’ Incident Response Team identified malicious Direct Send activity and escalated the incident to the customer. After receiving the escalation and working with the Varonis team, the customer confirmed the risk by reviewing other platforms in their security stack.  

After reviewing the activity, Varonis scanned the customer’s environment for additional messages originating from the associated IP range and began implementing org-wide measures to block Direct Send. 

In another instance, a customer similarly received escalated threat information from Varonis, leading to measures that protected their network and data. In this instance, the customer added the associated indicators of compromise to their security stack’s IP block list, added the email subject to their email security application’s dictionary, and added spoofing rules to their Exchange Online ruleset. 

Leveraging Varonis' inbound escalation service 

In addition to the proactive measures that the Varonis MDDR takes on behalf of customers, customers can reach out to the MDDR team to investigate suspicious activity. In one example, the targeted customer confirmed that a suspicious email with an attachment had evaded their email security platform and reached eight users.  

The phishing emails appeared to have been sent from the user’s own email account and included an attachment with a QR code. The QR code helped to obfuscate the attack vector, minimizing the email security tool’s ability to identify a malicious link. On top of that, the QR code significantly increased the likelihood that an employee would use their own device to scan the QR code and access the malicious link outside of the organization’s network.  

The customer leveraged Varonis’ inbound escalation service to request Incident Response Services. Further investigation determined that the organization had been targeted with an email relating to a voicemail message, the email had originated from outside the organization, and the email authentication checks for the email, such as SPF, and DMARC, had failed. Based on a review of the attack, Varonis Threat Labs identified the attack as a likely exploitation of the Direct Send feature. 

<DRA Call to action> or <Varonis Threat Labs call to action> 

Explore more Varonis Threat Labs content.
Learn more
Threat-Eye

How Varonis stops attackers in their tracks 

The combination of the Varonis Threat Labs and the MDDR service ensures: 

  • Early warning on critical vulnerabilities like Microsoft 365 Direct Send abuse 
  • 24x7x365 incident response and a 30-minte SLA on ransomware 
  • World-class breach support and forensics 

Want to learn how Varonis can help your organization? Take our free Data Risk Assessment to have access to the Varonis Platform and your own dedicated IR analyst.  

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

what-salesforce-organizations-need-to-know-about-the-growing-vishing-threat-from-unc6040 
What Salesforce Organizations Need to Know About the Growing Vishing Threat from UNC6040 
Learn about the vishing threat from UNC6040 targeting Salesforce environments and how to protect your organization from data breaches and extortion.
toolshell:-a-sharepoint-rce-chain-actively-exploited 
ToolShell: A SharePoint RCE chain actively exploited 
ToolShell is a critical SharePoint RCE exploit chain. Learn how it works, who’s at risk, and how to protect your environment before it’s too late.
creating-custom-gpts-and-agents-that-balance-security-and-productivity
Creating Custom GPTs and Agents That Balance Security and Productivity
Custom GPTs and AI agents compound productivity, but with that comes added risk. Learn about ChatGPT's custom GPTs and how to build them with data security in mind.