Microsoft 365 Admin portal abused to send sextortion emails

Microsoft 365 Admin portal abused to send sextortion emails

The Microsoft 365 Admin Portal is being abused to send sextortion emails, making the messages appear trustworthy and bypassing email security platforms.

Sextortion emails are scams claiming that your computer or mobile device was hacked to steal images or videos of you performing sexual acts. The scammers then demand from you a payment of $500 to $5,000 to prevent them from sharing the compromising photos with your family and friends.

While you would think no one could fall for these scams, they were very profitable when they first appeared in 2018, generating over $50,000 a week. To this day, BleepingComputer continues to receive messages from people concerned after receiving them.

Since then, scammers have created numerous variants of extortion email scams, including ones that pretend to have caught your spouse cheating or include pictures of your home to scare you into paying the extortionist in Bitcoin.

However, email security platforms have become good at detecting these scam emails and typically quarantine them in the spam folder.

Abusing the Microsoft 365 Admin Portal for scams

Over the past week, people on LinkedIn, X, and the Microsoft Answers forum reported receiving sextortion emails through the Microsoft 365 Message Center, allowing the scams to bypass spam filters and land in the inbox.

“I received an extortion scam email yesterday. These things usually end up in junk/spam, however this one made it past the filters as it was sent by Microsoft 365 Message Center.

“Any ideas on how they would have managed to do this?”asked cybersecurity professional Edwin Kwan.

Sextortion scam sent from Microsoft 365 Admin PortalSextortion scam sent from Microsoft 365 Admin Portal
Source: Edwin Kwan

The sextortion emails came from “o365mc@microsoft.com,” which may feel like a phishing address but is actually Microsoft’s legitimate email address used to send messages and notifications from the Microsoft 365 Message Center.

For those not familiar with the Microsoft 365 Admin Portal, it includes a section called the “Message Center,” which contains communication from Microsoft about service advisories, new features, and upcoming changes.

When viewing an advisory, a “Share” link allows you to share the advisory with other people, as shown below.

Share message dialogShare link in a Microsoft 365 Message Center message
Source: BleepingComputer

Clicking on the Share button opens a dialog asking you to input up to two email addresses to which the advisory should be sent, regardless of whether they are external or internal to your organization.

This screen also includes an optional “Personal Message,” which will be added to the emailed advisory.

Share message dialogShare message dialog
Source: BleepingComputer

The threat actors are abusing the Personal Message feature by using it to send the sextortion message. However, this personal message field is limited to only 1,000 characters, with anything additional being truncated by the user interface.

As the extortion message sent by the scammers is far more than 1,000 characters, it made me wonder how they were bypassing this restriction.

The answer is simple. They just open up the browser’s dev tools and change the maximum length field of the