Token theft and phishing attacks in Microsoft 365 are rapidly increasing, with over half of surveyed organizations experiencing a breach in the past year.
Attackers are leveraging advanced techniques such as session token harvesting, bypassing traditional multi-factor authentication (MFA), and exploiting weaknesses in email filtering and domain authentication. Effective prevention requires a layered approach, including advanced email security, managed device policies, phishing-resistant authentication, and vigilant configuration of domain records and app permissions.
In this episode of the Demystifying Microsoft podcast, host Nathan Taylor (SVP, Global Microsoft Practice Leader at the Sourcepass MCOE) and guest Nick Ross (CEO, CloudCapsule) explore the evolving landscape of token theft and phishing in Microsoft 365, offering practical insights and examples to help organizations strengthen their security posture and prevent business email compromise.
Attackers are increasingly bypassing multi-factor authentication in Microsoft 365 by harvesting session tokens during legitimate-looking login flows. These tokens act as digital keys, granting access to accounts even after MFA is completed. Once inside, attackers can establish persistence, move laterally, and launch further attacks without triggering standard security alerts.
Tools like Evil Jinx make it possible to simulate authentic logins and replay stolen tokens, allowing attackers to evade detection and exploit weaknesses in account and email security.
Microsoft 365 offers several layers of defense:
Routing email through third-party MX filters (Proofpoint, Mimecast, etc.) can break Microsoft’s security chain, disrupting SPF, DKIM, and TLS validation. This reduces Microsoft’s ability to detect and block malicious emails, making it critical to evaluate whether API-based filtering is a better option for maintaining full security telemetry.
Properly configured DMARC, SPF, and DKIM records are essential for preventing domain spoofing and phishing. Many organizations set DMARC to “none,” which is insufficient for blocking spoofed emails. Moving to “quarantine” or “reject” settings is recommended for stronger protection.
Microsoft 365 security is evolving rapidly, and attackers are adapting just as quickly. The strategies discussed in this episode, including layered email protection, managed device policies, advanced authentication, and domain controls, are essential for reducing risk and maintaining business continuity. By implementing these practical steps and staying informed about emerging threats, organizations can build a resilient security posture that keeps data and operations protected.
For ongoing updates and practical insights on Microsoft 365 security, subscribe to the Demystifying Microsoft podcast.
If you have questions about how these security strategies could impact your organization or want to discuss options for deploying advanced protections, connect with a Sourcepass Center of Excellence for Microsoft expert today.