- "도난 시도만 3억 달러 이상"··· AI 기반 '벤더 이메일 손상 공격'에 주목할 이유
- Cyber as a Pressure Valve: Why Economic Conflict Is Fueling a New Era of Cyber Escalation
- “2025년 스테이블코인 투자 2024년 대비 10배 예상”···CB인사이츠, ‘스테이블코인 시장 지도’ 공개
- The best portable power stations for camping in 2025: Expert tested and reviewed
- "제조 업계, 스마트 기술 전환 중··· 95%가 AI 투자 예정" 로크웰 오토메이션
Scammers Exploit Microsoft 365 to Target PayPal Users

A new phishing technique exploiting PayPal’s money request feature has been identified, using a legitimate PayPal money request that may appear genuine to recipients.
According to a new advisory by Fortinet, the scammer registered a free Microsoft 365 test domain and created a distribution list containing the targeted email addresses. A payment request was then initiated via PayPal, with the distribution list used as the recipient address.
How the Attack Works
When the request was sent, Microsoft’s Sender Rewrite Scheme (SRS) modified the sender address to bypass email authentication checks, making it appear valid. In addition, the email, URL and sender address passed PayPal’s security checks, deceiving users into believing it was legitimate.
If the recipient panicked and logged into their PayPal account through the provided link, the scammer gained access to their account.
Read more on email security: Critical Infrastructure at Risk From Email Security Breaches
“Standard phishing methods typically require threat actors to craft and deliver emails to a wide audience,” commented Elad Luz, head of research at Oasis Security.
“In this case, however, the threat actors exploit a vendor feature to deliver their messages. The emails are sent from a verified source and follow an identical template to legitimate messages, such as a standard PayPal payment request. This makes [it] difficult for mailbox providers to distinguish [them] from genuine communications, leaving PayPal as potentially the only entity capable of mitigating the issue.”
Defending Against Phishing Threats
To defend against such threats, Fortinet emphasized the importance of a well-trained “human firewall.” Employees should be educated to scrutinize all unexpected payment requests, even when they appear legitimate.
Additionally, the company recommended using data loss prevention (DLP) rules to detect such attacks. A DLP rule can be configured to flag emails involving multiple recipients from a distribution list, helping identify and block these phishing attempts.
“Using neural networks to analyze social graph patterns and other advanced AI techniques in more modern security tools helps spot these hidden interactions by analyzing user behaviors more deeply than static filters,” added Stephen Kowski, field CTO at SlashNext.
“That kind of proactive detection engine recognizes unusual group messaging patterns or requests that slip through basic checks. A thorough inspection of user interaction metadata will catch even this sneaky approach.”
Image credit: Nuttapong punna / Shutterstock.com