Office 365 Phishing Escalation: Spoofed Internal Emails
Attackers are bypassing traditional email filters by spoofing internal domains in Office 365 environments. These phishing emails appear to originate from within the organization, increasing the likelihood of user trust and interaction. The technique exploits misconfigured tenants that lack proper anti-spoofing protections such as DMARC, DKIM, and SPF. Once the message is delivered, users are more likely to click malicious links or provide credentials to spoofed login pages.
Security Recommendations: Organizations should enforce strict DMARC policies, audit SPF records, and transition to phishing-resistant MFA to reduce reliance on user judgment.
ClickFix / PHALT#BLYX Malware Campaign: Fake BSOD and Remote Access Trojan
A sophisticated phishing campaign is targeting European hospitality businesses by impersonating hotel booking platforms and luring users into interacting with emails that lead to a fake Blue Screen of Death (BSOD). Victims are prompted to enter code into Windows, which results in the deployment of DCRat, a full-featured remote access trojan. This attack leverages trusted Windows components such as MSBuild and PowerShell to evade antivirus and EDR controls.
Security Recommendations:
- Expand security awareness training to address psychological manipulation techniques beyond traditional phishing.
- Restrict and harden access to built-in scripting tools within user environments.
- Use endpoint hardening and advanced phishing training services to reduce exposure to multi-stage attacks.
Microsoft 365 Admin Center to Enforce MFA
Beginning February 9, 2026, Microsoft will require all users accessing the Microsoft 365 Admin Center to authenticate using multi-factor authentication. This policy change aligns with ongoing efforts to secure administrative access and prevent compromise of high-value accounts.
Security Recommendations: Organizations should proactively enable MFA for all privileged accounts and test access workflows now to avoid business disruption.
Google Ending POP3 Support in Gmail
Google will discontinue support for the POP3 protocol in Gmail beginning in 2026. This will prevent Gmail from retrieving mail from third-party inboxes using POP3 and end support for Gmailify. While this is primarily an operational shift, POP3 is also a legacy protocol with limited encryption and security features.
Security Recommendations: Organizations still relying on POP3 should begin migration planning to IMAP or API-based access to maintain continuity and security.
Summary Takeaways
Legacy email protocols are being phased out, requiring attention to business continuity and security posture.
Phishing remains the dominant threat vector, with attackers leveraging both technical misconfigurations and social engineering.
MFA and identity controls are tightening across platforms, and enforcement is increasing.
