

But these 3 mitigation steps will help you stop them cold
For years, most people in the IT industry had confidence in Microsoft’s ability to strictly control mail flow via Office 365 (these days known officially as Microsoft 365). In other words, they were confident Microsoft had made it impossible for one email customer to impersonate another.
In July of 2024, researchers at Guardio Labs disclosed a new type of Office 365 authentication bypass attack they called “EchoSpoofing.”
The attackers redirected the spoofed emails through a virtual SMTP server, Microsoft Exchange Online server and a trusted third-party SMTP relay service. By mimicking official email relays with authenticated Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) signatures, the spoofed emails passed standard authentication checks.
Fortunately, the Guardio Labs researchers responsibly disclosed the issue to the targeted email security provider, leading to a speedy and effective remedy. But not before some quick-thinking attackers managed to send millions of convincingly spoofed emails that appeared to come from trusted brands like Disney, Coca-Cola and Nike. The fraudulent emails were designed to steal funds and credit card details.
The name EchoSpoofing comes from the relay service “echoing” back the spoofed emails and sending them on their way as genuine emails. But no matter the technique, the result is this: Malicious Microsoft 365 (Office 365) tenant owners successfully spoofed the identity of other legitimate Microsoft 365 customers.
While the news of 2024 seems firmly in the rearview for many, we recently noticed the story didn’t end there. In analyzing attack chain activity around the world, the Symantec and Carbon Black Threat Hunters picked up on a new EchoSpoofing variant–a pivot that replaces the original SMTP relay service (the one patched a year ago) with an email hygiene provider.
Let’s look at how attackers make use of this variant. We’ll start with a basic attack flow in which the attacker:

This attack is effective even when the company being impersonated has implemented strict authentication measures (e.g., APF, DKIM, DMARC with a=reject). Because the email is coming from the attacker's own on-premises server, it fails DMARC when it arrives on Office 365, but Microsoft replaces the DMARC rejection action with “oreject” which marks the email as spam but does not prevent it from entering the attacker's tenant.
Microsoft identifies this email as suspicious and, instead of sending it through the IP address range listed in their SPF record, it sends it through a “high risk” IP range: 40.95.0.0/16. Additionally, it does not DKIM sign the mail. This means that much of the mail is rejected by the intended recipient. But even in 2025, enough organizations still aren’t enforcing authentication checks on their inbound email that it’s worthwhile for attackers to put forth the effort.
Advanced attack flow
Beyond the basic attack described above, we’ve also recently seen an advanced version of this attack, which takes advantage of third-party email scanning services to add veracity to the spam emails. This approach, while requiring essentially the same amount of work as the basic flow (and even the original EchoSpoof variety), likely gives the attacker a greater chance of reaching their intended victim.
This attack starts in the same way as the basic attack but contains some extra steps:

By delivering the DKIM-signed email from valid SPF IP addresses, the attacker has a greater chance of successfully reaching the victim’s inbox.
Mitigating the risk of new EchoSpoofing attacks
Don’t panic. Office 365 customers can take a number of steps to mitigate the risk of these new EchoSpoofing attacks.
Read more from Microsoft on this spoofing behavior, and what you can do about it. (I can’t resist calling out the opening line from this Microsoft article: “Email servers in the Microsoft 365 datacenters might be temporarily guilty of sending spam.” Talk about an attention getter.)