By bypassing traditional spam filters, this vector dramatically increases credential theft and business‑email‑compromise risk, leading to costly remediation. Strengthening email authentication and MFA reduces exposure and protects critical business communications.
The surge in email‑routing‑based phishing reflects a broader shift toward exploiting infrastructure complexity. Modern enterprises often blend on‑premises mail servers, third‑party relays, and cloud services like Microsoft 365. When MX records point to intermediate hops, standard authentication checks such as SPF hard‑fail and DMARC enforcement can be skipped, allowing attackers to craft messages that display the recipient’s own address in both the "To" and "From" fields. This internal façade dramatically raises user trust and click‑through rates, especially when paired with sophisticated phishing‑as‑a‑service kits that automate lure creation.
Beyond the immediate spoofing, the compromised sessions enable adversary‑in‑the‑middle (AiTM) attacks that harvest authentication tokens in real time, often sidestepping multi‑factor authentication. The combination of credential theft and BEC potential makes the threat lucrative for financially motivated actors. Organizations with lax DMARC policies—especially those set to "none" or "quarantine"—provide a fertile environment for these campaigns, as unauthenticated mail is allowed to land directly in inboxes, bypassing spam filters and security gateways.
Mitigation hinges on tightening mail authentication and identity controls. Deploying a DMARC policy of "reject" forces unauthenticated messages to be discarded, while enforcing SPF hard‑fails ensures only authorized senders pass. Administrators must audit MX records to confirm direct routing to Microsoft 365 or ensure intermediate relays correctly propagate authentication results. Additionally, adopting phishing‑resistant MFA methods such as FIDO2 keys, conditional access policies, and MFA number matching can blunt AiTM exploits. By aligning email infrastructure with best‑practice authentication and reinforcing identity safeguards, enterprises can significantly lower the risk of costly phishing breaches.
Comments
Want to join the conversation?
Loading comments...