PULSE NAME
Phishing actors exploiting complex routing scenarios and misconfigured spoof protections
WHITE AlienVault 2026-01-07 Modified: 2026-02-06
6
IOCs
LOW VOLUME
Threat actors are leveraging complex routing scenarios and misconfigured spoof protections to send phishing emails that appear to be internal communications. These attacks, which have increased since May 2025, use various lures like voicemails, shared documents, and password resets to conduct credential phishing and financial scams. The campaigns, often using PhaaS platforms like Tycoon2FA, are opportunistic and target multiple industries. While Microsoft detects most attempts, organizations can further mitigate risks by properly configuring spoof protections and third-party connectors. The attacks do not affect customers whose Microsoft Exchange MX records point to Office 365, as they are protected by built-in spoofing detections.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
Tycoon2FA
Indicators of Compromise (6)
All domain hostname
TYPEINDICATORDESCRIPTIONCREATED
domain absoluteprintgroup.com 2026-01-07
domain integralsm.cl 2026-01-07
domain scanuae.com 2026-01-07
hostname 2fa.valoufroo.in.net 2026-01-07
hostname goorooyi.yoshemo.in.net 2026-01-07
hostname online.amphen0l-fci.com 2026-01-07