<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Suspicious-Email — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/suspicious-email/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/suspicious-email/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft 365 Suspicious Email Delivery</title><link>https://feed.craftedsignal.io/briefs/2024-01-m365-suspicious-email/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-m365-suspicious-email/</guid><description>This brief outlines a threat where Microsoft Defender for Office 365 identifies an email as malicious or suspicious but still delivers it to a user's inbox or junk folder, potentially bypassing initial security measures.</description><content:encoded><![CDATA[<p>This threat involves malicious or suspicious emails, as identified by Microsoft Defender for Office 365, being delivered to user mailboxes despite the existing security mechanisms. This can occur due to various factors, including misconfigured security policies, sophisticated attacker techniques that evade detection, or delayed signature updates. The delivery of such emails presents a significant risk, as they may contain spearphishing attachments, malicious links, or other harmful content designed to compromise user accounts or systems. Successful exploitation can lead to data theft, malware infection, and further propagation of the attack within the organization. It&rsquo;s crucial to investigate these instances promptly to remediate any potential damage and improve email security posture.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a spearphishing email designed to bypass standard security filters.</li>
<li>The email is sent to a target user within the Microsoft 365 environment.</li>
<li>Microsoft Defender for Office 365 analyzes the email and identifies it as suspicious but fails to block delivery.</li>
<li>The email is delivered to the user&rsquo;s Inbox or Junk folder.</li>
<li>The user opens the email and clicks on a malicious link or opens a malicious attachment (e.g., a macro-enabled document).</li>
<li>The link redirects the user to a credential harvesting site, or the attachment executes malicious code (e.g., via PowerShell).</li>
<li>The attacker gains access to the user&rsquo;s account or system.</li>
<li>The attacker uses the compromised account to further propagate the attack, exfiltrate data, or deploy malware within the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of this threat can be significant. Successful exploitation can lead to the compromise of user accounts, data theft, malware infection, and financial loss. Organizations may experience business disruption, reputational damage, and legal liabilities. The number of affected users and the extent of the damage will depend on the attacker&rsquo;s objectives and the organization&rsquo;s security controls.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided to detect suspicious email delivery events within your Microsoft 365 environment and tune for your specific environment.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the root cause of the bypass and remediate any potential damage.</li>
<li>Review and adjust Microsoft Defender for Office 365 settings to improve detection accuracy and blocking capabilities.</li>
<li>Educate users about the risks of phishing emails and encourage them to report suspicious messages.</li>
<li>Monitor the <code>TIMailData</code> operation within the M365 audit logs for further analysis and threat hunting.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>suspicious-email</category><category>phishing</category><category>microsoft365</category></item></channel></rss>