{"id":14343,"date":"2025-06-27T03:18:06","date_gmt":"2025-06-27T03:18:06","guid":{"rendered":"https:\/\/newestek.com\/?p=14343"},"modified":"2025-06-27T03:18:06","modified_gmt":"2025-06-27T03:18:06","slug":"dont-trust-that-email-it-could-be-from-a-hacker-using-your-printer-to-scam-you","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14343","title":{"rendered":"Don\u2019t trust that email: It could be from a hacker using your printer to scam you"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Printers and scanners are increasingly becoming ways for cyber crooks to deliver phishing attacks, thanks to a flaw in the Microsoft 365 Direct Send feature.<\/p>\n<p>The Varonis forensics team has uncovered an exploit which allows internal devices such as printers to send emails without authentication. The vulnerability has been used to target more than 70 organizations, predominantly in the US, with threat actors spoofing internal users and delivering phishing emails without needing to compromise any accounts whatsoever.<\/p>\n<p>The campaign has been successful because emails sent from within Microsoft 365 (M365) undergo less scrutiny than standard inbound email.<\/p>\n<p>\u201cThis discovery underscores a classic case of functionality versus security,\u201d said Ensar Seker, CISO at SOCRadar. \u201cMicrosoft 365\u2019s Direct Send feature is designed for convenience, allowing devices like printers or scanners to send emails without authentication, but that very design opens a door for abuse when misconfigured or misunderstood.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"spoofing-made-remarkably-easy\">Spoofing made \u2018remarkably easy\u2019<\/h2>\n<p>M365 Direct Send is intended for internal use only, but it\u2019s easy for hackers to access because no authentication is required. <a href=\"https:\/\/www.csoonline.com\/article\/4002765\/third-party-risk-management-is-broken-but-not-beyond-repair.html\" target=\"_blank\">Attackers<\/a> don\u2019t need credentials, tokens, or even access to the tenant; they just need a few publicly-available details and a talent for guessing.<\/p>\n<p>This is because Direct Send uses a smart host with a common format: <em>tenantname.mail.protection.outlook.com<\/em>, and companies\u2019 internal email address formats can be trivial to figure out or easy to scrape from public sources or social media. Once an attacker has the domain and a valid email address, they are able to send emails that appear to come from inside the organization.<\/p>\n<p>In the campaign observed by Varonis\u2019 forensics experts, the attacker used PowerShell to send emails that were designed to resemble voicemail notifications which included a PDF attachment with a QR code that redirected users to a site designed to harvest M365 credentials.<\/p>\n<p>Varonis\u2019 researchers pointed out that the campaign works because no logins or credentials are required, the smart host accepts emails from any external source, the \u201cfrom\u201d address can be spoofed to any be internal user, and the only requirement is that the recipient is internal to the client organization.<\/p>\n<p>Further, because it is routed through Microsoft infrastructure and seems to be coming from within the organization, the email bypasses traditional security controls, including Microsoft\u2019s own filtering mechanisms which treat it as internal-to-internal, or third-party tools that flag suspicious messages based on authentication, routing patterns, or sender reputation.<\/p>\n<p>\u201cThe challenge is that many organizations either leave default settings unchanged or fail to restrict sender permissions, making spoofing from internal-looking sources remarkably easy,\u201d said Seker.<\/p>\n<p>David Shipley of Beauceron Security called this vulnerability a classic case of \u201cown gun, own foot\u201d and noted that it \u201cdoesn\u2019t exactly fit\u201d <a href=\"https:\/\/www.csoonline.com\/article\/3966122\/microsoft-sfi-update-five-of-28-security-objectives-nearly-complete.html\" target=\"_blank\">Microsoft\u2019s Secure Futures Initiative<\/a>, the company\u2019s campaign to continuously secure itself and its customers.<\/p>\n<p>\u201cThis kind of cleverness is the direct result of the email security cat and mouse game,\u201d said Shipley. As more organizations adopt security features like sender policy framework (SPF), domain-based message authentication, reporting, and conformance (DMARC) and DomainKeys identified mail (DKIM), and invest in e-mail filters, regular spoofing gets much harder.<\/p>\n<p>It\u2019s essentially low-hanging fruit for criminals, he added, and \u201canyone using [Direct Send] should revisit it yesterday now that this report is out.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"what-to-look-for\">What to look for<\/h2>\n<p>To determine whether there\u2019s been abuse, Varonis researchers advise investigating message headers and behavioral signals. Message header indicators include external IPs sent to the smart host, or failures in SPF, DKIM, or DMARC for internal domains. Also, the \u201cX-MS-Exchange-CrossTenant-Id\u201d should match the organization\u2019s tenant ID.<\/p>\n<p>Behavioral indicators could include emails sent from users to themselves; unusual IP addresses; suspicious attachments or filenames; and PowerShell or other command-line user agents.<\/p>\n<p>Microsoft has said it is <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/exchange\/introducing-more-control-over-direct-send-in-exchange-online\/4408790\" target=\"_blank\" rel=\"noreferrer noopener\">working to disable<\/a> Direct Send by default, and customers can enforce a static IP address in the SPF record to prevent send abuse, but it isn\u2019t a direct requirement.<\/p>\n<p>To be proactive, the Varonis researchers urge IT leaders to:<\/p>\n<ul class=\"wp-block-list\">\n<li>Implement strict DMARC and anti-spoofing policies.<\/li>\n<li>Flag unauthenticated internal emails for review.<\/li>\n<li>Enforce \u201cSPF hardfail\u201d in Exchange Online Protection (EOP).<\/li>\n<li>Enable \u201cReject Direct Send\u201d in the Exchange Admin Center.<\/li>\n<li>Educate users on the risks associated with Quishing (QR code) attacks.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"treat-network-connected-devices-as-fully-fledged-endpoints\">Treat network-connected devices as \u2018fully-fledged endpoints\u2019<\/h2>\n<p>Seker noted that configuring Direct Send securely requires narrowing down IP ranges allowed to use it, implementing strict SMTP relay restrictions, and monitoring for anomalies like devices sending to distribution lists or external domains. It\u2019s also critical to pair these techniques with strong SPF, DKIM, and DMARC enforcement, which is something many enterprises overlook.<\/p>\n<p>Spam and phishing campaigns from scanners and printers are becoming more common because \u201cthey blend in,\u201d Seker said. \u201cEmployees are used to seeing scanned document notifications and rarely question their authenticity.\u201d To combat this, organizations should treat network-connected devices as \u201cfully-fledged endpoints,\u201d complete with segmentation, logging, and behavioral baselines to detect misuse.<\/p>\n<p>Ultimately, it comes down to a visibility problem, said Seker.<\/p>\n<p>\u201cIf you don\u2019t know what your devices are capable of, or what they\u2019re allowed to do, you can\u2019t defend against it,\u201d he said. \u201cThe Direct Send abuse is just another reminder that attackers don\u2019t need zero-days when misconfigurations are everywhere.\u201d<\/p>\n<p>Still, Roger Grimes, data-driven defense evangelist at KnowBe4, pointed out that, while these types of campaigns exploiting devices are becoming more common, they\u2019re not rampant.<\/p>\n<p>\u201cWe\u2019ve been worrying about printers, copiers, scanners, and now other IoT devices being used by hackers to do bad things for decades,\u201d he said. \u201cAnd what history has shown is that, although it can be done in certain scenarios, it never becomes super popular.\u201d<\/p>\n<p>This is mostly because tactics already in use by hackers and scammers are working quite well. \u201cThere\u2019s no need to do something different or harder to pull off when the current methods are making scammers rich,\u201d he said.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Printers and scanners are increasingly becoming ways for cyber crooks to deliver phishing attacks, thanks to a flaw in the Microsoft 365 Direct Send feature. The Varonis forensics team has uncovered an exploit which allows internal devices such as printers to send emails without authentication. The vulnerability has been used to target more than 70 organizations, predominantly in the US, with threat actors spoofing internal&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14343\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14343","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14343"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14343\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}