TOAD Attacks via Entra Guest Invites

2 minute read Published: 2025-11-14

We have identified a new phishing/reverse phishing campaign that uses Microsoft Entra tenant invitations to trick recipients into calling a telephone number, referencing a fictitious bill. From the phone number, normal TOAD TTPs are in play. The use of Entra Guest user invitations seems solely to take advantage of the Message field in the Guest User invitation.

This field can be arbitrarily long, and is used to create a phishing lure. Invites will come from invites@microsoft[.]com, which is a legitimate address and likely won't be blocked by email filters. This is similar to previous campaigns that use message fields in notifications from trusted services to embed a phishing lure.

If you have access to email logs, I recommend searching for listed strings below.

IoCs

IndicatorTypeDescription
invites@microsoft[.]comEmailSender address for Entra invites
invited you to access applications within their organizationStringEmail Subject substring to search for Guest User invitations
CloudSyncStringAttacker Tenant Name
Advanced Suite ServicesStringAttacker Tenant Name
TenantHubStringAttacker Tenant Name
Unified Workspace TeamStringAttacker Tenant Name
Advanced Suite ServicesStringAttacker Tenant Name
x44xfqf.onmicrosoft[.]comDomainAttacker Tenant Domain
woodedlif.onmicrosoft[.]comDomainAttacker Tenant Domain
xeyi1ba.onmicrosoft[.]comDomainAttacker Tenant Domain
x44xfgf.onmicrosoft[.]comDomainAttacker Tenant Domain
18052948531Telephone NumberListed Number in observed lures

Acknowledgments

Thanks to Ian Campbell and cr0w for additional corroboration on this campaign.