MLXIO
a man wearing a mask
CybersecurityMay 24, 2026· 6 min read· By MLXIO Insights Team

Scammers Abuse Real Microsoft Address to Push Phishing

Share

MLXIO Intelligence

Analysis Snapshot

56
Moderate
Confidence: LowTrend: 10Freshness: 95Source Trust: 85Factual Grounding: 91Signal Cluster: 20

Moderate MLXIO Impact based on trend velocity, freshness, source trust, and factual grounding.

Thesis

High Confidence

Scammers are abusing a legitimate Microsoft account-alert address to send phishing and scam links, weakening a basic trust signal used by Microsoft users and enterprise security teams.

Evidence

  • The emails appear to come from [email protected], a real Microsoft address used for account alerts.
  • TechCrunch reported the address is used for legitimate notifications including two-factor authentication codes and critical account alerts.
  • The Spamhaus Project said the activity has been running for several months.
  • Microsoft said it is investigating the phishing reports, strengthening detection and blocking, and removing accounts that violate its Terms of Use.

Uncertainty

  • Microsoft has not publicly explained the loophole being abused.
  • The scale of affected users is not disclosed.
  • The reporting does not establish whether the messages delivered malware or stole credentials.

What To Watch

  • Microsoft disclosure on the abuse mechanism and containment timeline.
  • Spamhaus or Microsoft updates on whether the campaign continues.
  • Enterprise guidance on filtering or handling Microsoft account-alert emails from this address.

Verified Claims

Scammers have sent spam and scam links from [email protected], a legitimate Microsoft account-alert address.
📎 The article says scammers have been sending spam and scam links from “[email protected],” described as a real Microsoft account-alert address.High
Microsoft uses the abused address for legitimate account notifications, including two-factor authentication codes and critical online account alerts.
📎 TechCrunch reports Microsoft uses the address for important account notifications, including “two-factor authentication codes” and critical alerts.High
The Spamhaus Project said the abuse had been occurring for “several months.”
📎 The article states Spamhaus publicly flagged the issue and said the activity dated back “several months.”High
Microsoft said it is investigating phishing reports and taking action by strengthening detection and blocking mechanisms and removing accounts that violate its Terms of Use.
📎 Microsoft’s statement said it is “actively investigating and taking action” and is “further strengthening our detection and blocking mechanisms, while removing accounts that violate our Terms of Use.”High
The reporting does not establish the exact loophole, the scale of affected users, or when the abuse will be fully contained.
📎 The article says Microsoft has not publicly explained the loophole, the scale of affected users, or when the abuse will be fully contained.High

Frequently Asked

What Microsoft email address are scammers abusing?

Scammers are abusing [email protected], a real Microsoft account-alert address used for legitimate security notifications.

Why is this Microsoft phishing issue concerning?

It is concerning because the messages appear to come from a trusted Microsoft sender, making the usual advice to check the sender address less reliable.

How long has the Microsoft account-alert email abuse been happening?

The Spamhaus Project said the activity had been running for “several months.”

What kinds of messages did the scam emails contain?

TechCrunch reported scammy web links and subject lines resembling fraud warnings or private-message prompts.

Has Microsoft responded to the phishing reports?

Yes. Microsoft said it is actively investigating, strengthening detection and blocking mechanisms, and removing accounts that violate its Terms of Use.

Updated on May 24, 2026

Scammers have been sending spam and scam links from [email protected], a real Microsoft account-alert address used for legitimate security notifications. The abuse matters most for Microsoft account holders and enterprise security teams because the messages do not merely mimic Microsoft — they appear to come through a trusted Microsoft sender, according to TechCrunch.

The activity has been running for “several months,” according to The Spamhaus Project, and Microsoft says it is now investigating phishing reports tied to the issue. The company has not publicly explained the loophole, the scale of affected users, or when the abuse will be fully contained.

The abused address, [email protected], is not an obvious throwaway sender. TechCrunch reports Microsoft uses it for important account notifications, including two-factor authentication codes and critical online account alerts.

That makes the campaign harder to dismiss at a glance. If the sender looks like a Microsoft-controlled address, why would an ordinary user treat it like a random phishing email?

TechCrunch said it received several similarly structured messages last week across different email accounts. The emails included subject lines and web links pointing to scammy sites. Some subject lines resembled official warnings about fraudulent transactions, while others claimed the recipient had a private message waiting at a web address listed in the email body.

The apparent abuse path is still murky. TechCrunch reported that scammers appear able to set up new Microsoft accounts as if they are new customers, then use that access to send emails that look like they came from Microsoft. The reporting does not establish exactly how the system is being manipulated.

Spamhaus publicly flagged the issue Tuesday and said the activity dated back “several months.”

“Automated notification systems should not allow this level of customization,” wrote Spamhaus.

Microsoft initially acknowledged TechCrunch’s inquiry but did not comment by press time. After publication, the company provided a statement through Emelia Katon, representing Microsoft via a third-party public relations agency.

“We are actively investigating and taking action against these phishing reports to help keep customers protected. This includes further strengthening our detection and blocking mechanisms, while removing accounts that violate our Terms of Use.”


Security teams lose a simple phishing test when the sender is legitimate

The obvious danger is trust. Users are trained to check the sender address. In this case, that check can fail because the email can appear to come from an address Microsoft actually uses.

For enterprises, the concern is sharper. Security teams often treat Microsoft account-alert emails as high-priority operational messages. If attackers can push scam links through a trusted notification channel, then user training, allowlists, and automated filtering rules may need tighter assumptions.

The supplied reporting does not say the messages delivered malware or stole credentials. But the risk path is clear: a recipient who trusts the sender could click into a scam site, a fake Microsoft login page, a payment lure, or another attacker-controlled destination. TechCrunch specifically reported links to scammy sites and subject lines that resembled fraud alerts or private-message prompts.

This is different from ordinary spoofing. In spoofing, the attacker pretends to be Microsoft from outside Microsoft’s systems. Here, the issue described by TechCrunch is abuse of a Microsoft notification mechanism itself.

That distinction matters because filters may treat authenticated or familiar infrastructure differently from unknown senders. The article does not say which authentication checks the emails passed, but the sender identity alone raises the practical burden on recipients and mail administrators.

The incident also lands amid separate Microsoft-related scrutiny. MLXIO has recently covered unrelated Microsoft security and platform issues, including Microsoft Defender Zero-Days Hand Hackers SYSTEM Keys and YellowKey Bypasses BitLocker, Microsoft Has No Patch. Those reports are separate from this email-abuse case, but they underscore why readers are watching Microsoft’s security handling closely.

A pattern beyond Microsoft

TechCrunch tied the Microsoft incident to other recent cases where attackers abused legitimate company systems rather than only impersonating brands from the outside.

Earlier this year, hackers broke into a platform used by Betterment to send fraudulent notifications promising to triple the value of crypto users sent in — a known scam format used to steal cryptocurrency. In 2023, hackers also abused access to an email account run by Namecheap to send phishing emails aimed at stealing credentials.

TechCrunch also reported that social media users said other companies’ email addresses are being used to send spam, suggesting the issue may not be limited to Microsoft. The article does not verify those other reports in detail.

For end users, the safest move is simple: do not click links in unexpected Microsoft account-alert emails, even if the sender looks familiar. Navigate directly to Microsoft’s official website or account portal instead.

That advice is less convenient, but it cuts out the attacker-controlled link. If an email claims there was a fraudulent transaction, a private message, or urgent account action, verify it from inside the account after typing the address yourself or using a trusted bookmark.

Practical steps now:

  • Check account activity: Review recent sign-ins from Microsoft’s official account security page.
  • Keep MFA on: Do not disable multifactor authentication because an email claims it is causing a problem.
  • Report suspicious messages: Use your email client’s phishing-reporting flow or Microsoft’s reporting tools.
  • Avoid embedded links: Treat links in unexpected Microsoft-branded alerts as untrusted until verified elsewhere.

IT teams should also review mail logs for unusual Microsoft-branded notification campaigns and warn employees that sender checks alone may not be enough. Link-scanning rules and user-awareness guidance should account for the possibility of messages arriving from legitimate-looking Microsoft infrastructure.

The immediate watch item is Microsoft’s next disclosure. The company has said it is investigating and removing violating accounts, but it has not yet explained the loophole, confirmed whether the abused mechanism has been disabled, or published detailed customer guidance. Until that changes, Microsoft alerts deserve verification before action — especially when they ask users to click.

Impact Analysis

  • Scammers are exploiting trust in a real Microsoft sender address, making phishing emails harder for users to spot.
  • Microsoft account holders may be more likely to click malicious links if alerts appear to come from a legitimate security-notification account.
  • Enterprise security teams may need to adjust filtering and user guidance because sender authenticity alone may not be enough to verify these messages.
MLXIO

Written by

MLXIO Insights Team

Algorithmic Research & Human Oversight

Powered by advanced algorithmic research and perfected by human oversight. The Insights Team delivers highly structured, cross-verified analysis on emerging tech trends and digital shifts, filtering out the fluff to give you high-fidelity value.

Related Articles

white usb cable on gray laptop computer
CybersecurityMay 23, 2026

YellowKey Bypasses BitLocker, Microsoft Has No Patch

YellowKey can bypass BitLocker with physical access, and Microsoft has mitigations—but no full patch yet.

7 min read

a close up of a network with wires connected to it
CybersecurityMay 22, 2026

Microsoft Defender Zero-Days Hand Hackers SYSTEM Keys

Microsoft rushed emergency Defender fixes after live attacks exploited two zero-days, including one path to SYSTEM-level control.

6 min read

a dell laptop computer with a red screen
CybersecurityMay 19, 2026

Top Antivirus Software for Windows 11 in 2026 Reveals Hidden Risks

Windows 11 users in 2026 confront stealthy cyber threats. This guide reveals which antivirus software outperforms built-in defenses to keep your PC safe.

12 min read

a dark room with a purple light coming out of the window
CybersecurityMay 18, 2026

MiniPlasma Zero-Day Grants SYSTEM Access on Patched Windows 11

MiniPlasma zero-day exploit lets attackers escalate privileges to SYSTEM on fully patched Windows 11, risking total system takeover before a fix arrives.

5 min read

a glass of beer
CybersecurityMay 16, 2026

Microsoft’s MDASH AI Snags 16 Critical Windows Flaws First

Microsoft’s MDASH AI detected 16 critical Windows flaws before hackers, shifting the cybersecurity balance with faster vulnerability discovery.

6 min read

turned on laptop computer
TechnologyMay 23, 2026

Windows 11 Taskbar Finally Escapes Its 5-Year Lockdown

Windows 11 is finally getting movable taskbars again, but Microsoft’s comeback still leaves power-user gaps.

5 min read

blue coupe parked beside white wall
AI / MLMay 23, 2026

Two Hours Killed Musk’s OpenAI Lawsuit Against Altman

Musk lost his OpenAI lawsuit after jurors ruled he sued too late, leaving the bigger fight over OpenAI’s mission unresolved.

8 min read

a glass of beer
AI / MLMay 23, 2026

72% Fara1.5 AI Crushes OpenAI and Google on Web Tasks

Microsoft’s open-weight Fara1.5 hit 72% on live-web tasks, beating OpenAI and Google in a key browser-agent test.

7 min read

time lapse photography of train
TechnologyMay 24, 2026

740 Seats at 320 km/h: TGV-M Grabs France Approval

France’s TGV-M is cleared for 320 km/h service, with 740 seats and a claimed 20% energy cut—but no public launch date yet.

5 min read

vintage gray game console and joystick
TechnologyMay 24, 2026

Windows CE Invades Nintendo 64 in a Wild Retro Hack

A modder got Windows CE 2.11 running on original Nintendo 64 hardware, turning the console into a tiny late-’90s desktop.

7 min read

Stay ahead of the curve

Get a weekly digest of the most important tech, AI, and finance news — curated by AI, reviewed by humans.

No spam. Unsubscribe anytime.