Office 365 Tenant Spoofing Vulnerability Checker
Microsoft's January 2026 advisory revealed that attackers are exploiting misconfigured email routing and weak DMARC policies to send spoofed emails that appear internal to O365 tenants. Check if your domain is at risk. Free, instant, no signup.
DNS-based check that tests MX routing, DMARC policy, SPF mechanism & alignment in seconds.
What We Check
MX Routing Analysis
Do your MX records point to Office 365 (*.mail.protection.outlook.com)? If not, there's a mail routing gap attackers can exploit to send emails that appear internal.
DMARC Policy Enforcement
Is your DMARC policy set to p=none (monitoring only)? This is the #1 weakness exploited by Tycoon2FA, and spoofed emails pass right through to inboxes.
SPF All-Mechanism
Does your SPF record use ~all (soft fail) or -all (hard fail)? Soft fail means unauthorised emails are flagged but still delivered. Attackers love this.
DMARC Alignment
Are your SPF and DKIM alignment settings strict or relaxed? Relaxed alignment allows subdomain spoofing, giving attackers more attack surface.
How the Attack Works
The O365 tenant spoofing attack exploits a gap between how email is routed and how it's authenticated. Here's the kill chain:
Attacker identifies target domain
Attacker scans for domains with DMARC p=none and SPF ~all, which are easily discoverable via public DNS records.
Spoofed email sent via external server
Using Tycoon2FA or similar tools, the attacker sends an email from an external SMTP server with the From: address set to an internal user (e.g., [email protected]).
Email passes weak authentication
SPF ~all soft fails but doesn't reject. DMARC p=none logs the failure but delivers the email anyway. The spoofed message lands in the target's inbox.
Victim sees "internal" email
The email appears to be from a colleague or executive. Outlook displays it as internal with no external sender warnings. The victim clicks the phishing link, entering credentials into a Tycoon2FA capture page that also intercepts MFA tokens.
Why This Attack Is So Effective
Unlike traditional phishing, these emails appear to come from inside your own organisation. Outlook doesn't show external sender warnings. The emails pass spam filters because the domain is your own. Combined with Tycoon2FA's ability to intercept MFA tokens, this represents a complete bypass of standard email security and authentication controls.
Who's at Risk
High Risk
- → Organisations with DMARC p=none and no plans to enforce
- → Domains using SPF ~all (soft fail) or ?all (neutral)
- → Companies using third-party email gateways with MX not pointing to O365
- → Organisations that haven't reviewed DNS records since migrating to O365
- → Tenants without conditional access policies or advanced threat protection
Better Protected
- → Domains with DMARC p=reject and strict alignment (aspf=s, adkim=s)
- → SPF configured with -all (hard fail)
- → MX records correctly pointing to *.mail.protection.outlook.com
- → DMARC aggregate reporting enabled and actively monitored
- → Microsoft Defender for O365 with anti-phishing policies enabled
How to Fix It
Follow these steps to protect your domain from the O365 tenant spoofing attack. Each step includes the exact DNS records to add or update.
Enforce DMARC Policy
If you're at p=none, progressively move to p=reject. This is the single most impactful change you can make.
# Start with quarantine (Week 1-2)
_dmarc.yourdomain.com TXT
"v=DMARC1; p=quarantine; rua=mailto:[email protected]; pct=100"
# Then enforce reject (Week 3-4+)
_dmarc.yourdomain.com TXT
"v=DMARC1; p=reject; rua=mailto:[email protected]; adkim=s; aspf=s; pct=100"
Switch SPF to Hard Fail
Change ~all (soft fail) to -all (hard fail) to reject emails from unauthorised servers.
# For Office 365 only
yourdomain.com TXT
"v=spf1 include:spf.protection.outlook.com -all"
# For O365 + other senders (adjust includes)
yourdomain.com TXT
"v=spf1 include:spf.protection.outlook.com include:_spf.google.com -all"
Verify MX Routing
Ensure your MX records point to the correct destination. For direct O365 routing:
# Standard Office 365 MX record
yourdomain.com MX 0
yourdomain-com.mail.protection.outlook.com
# If using a third-party gateway (Mimecast, Proofpoint, etc.)
# Ensure your gateway enforces DMARC and has anti-spoofing rules
Enable Additional O365 Protections
- ✓ Enable Microsoft Defender for Office 365 anti-phishing policies
- ✓ Configure Impersonation Protection for executives and key users
- ✓ Enable External Sender Tagging to flag emails from outside your tenant
- ✓ Set up Conditional Access Policies requiring compliant devices for email access
- ✓ Enable Safe Links and Safe Attachments in Defender
- ✓ Review and monitor DMARC aggregate reports weekly
Frequently Asked Questions
What is the Microsoft O365 tenant spoofing vulnerability?▼
How do attackers exploit misconfigured email routing?▼
What is the Tycoon2FA phishing platform?▼
Why is DMARC p=none dangerous for Office 365?▼
How do I check if my domain is vulnerable?▼
What MX records should I have for Office 365?▼
Should I use SPF hard fail or soft fail?▼
How do I move from DMARC p=none to p=reject?▼
Check your domain now
Enter your domain above to see if you're vulnerable to the O365 tenant spoofing attack. Free, instant, no signup required. For a comprehensive security audit, run a full domain scan.