Home ยป Hackers Exploit Microsoft Tenant Invitations for TOAD Phishing

Hackers Exploit Microsoft Tenant Invitations for TOAD Phishing

Custom illustration showing a Microsoft Entra guest invitation overlaid with a warning about TOAD callback phishing attacks Attackers weaponize Microsoft Entra guest invitations to launch TOAD callback phishing against Microsoft 365 tenants

Attackers continue to adapt classic phishing techniques to exploit trusted cloud infrastructure, and Microsoft Entra tenant invitations now sit firmly in their crosshairs. In this emerging campaign, adversaries abuse ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ญ๐ž๐ง๐š๐ง๐ญ ๐ข๐ง๐ฏ๐ข๐ญ๐š๐ญ๐ข๐จ๐ง๐ฌ to deliver ๐“๐Ž๐€๐ƒ (Telephone-Oriented Attack Delivery) attacks that bypass traditional URL-centric defenses and drive victims toward attacker-controlled phone numbers. Instead of asking users to click a suspicious link, the phish arrives as a genuine guest user invitation from invites@microsoft[.]com, complete with realistic tenant names and fabricated billing details, which makes it far more convincing at first glance.

๐’๐ก๐ข๐Ÿ๐ญ ๐Ÿ๐ซ๐จ๐ฆ ๐ฅ๐ข๐ง๐ค-๐›๐š๐ฌ๐ž๐ ๐ฉ๐ก๐ข๐ฌ๐ก๐ข๐ง๐  ๐ญ๐จ ๐“๐Ž๐€๐ƒ

๐“๐ž๐ฅ๐ž๐ฉ๐ก๐จ๐ง๐ž-๐Ž๐ซ๐ข๐ž๐ง๐ญ๐ž๐ ๐€๐ญ๐ญ๐š๐œ๐ค ๐ƒ๐ž๐ฅ๐ข๐ฏ๐ž๐ซ๐ฒ evolved as email security improved at catching obvious malicious URLs and attachments. In TOAD campaigns, the initial email usually contains no payload at all. Instead, it pushes the victim to call a phone number, where a human or scripted operator walks them through fake support steps, credential capture, and sometimes remote-access tooling. Several detailed breakdowns of TOAD trends show that callback phishing regularly evades secure email gateways because the email content often looks harmless at a static level.

Because of this shift, defenders must treat phone numbers inside cloud-delivered messages with the same suspicion they once reserved for attachment-based lures. In the ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ญ๐ž๐ง๐š๐ง๐ญ ๐ข๐ง๐ฏ๐ข๐ญ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐“๐Ž๐€๐ƒ ๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ described here, that phone number sits inside a legitimate guest invitation that many users instinctively trust.

๐‡๐จ๐ฐ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ ๐ฎ๐ž๐ฌ๐ญ ๐ข๐ง๐ฏ๐ข๐ญ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐ง๐จ๐ซ๐ฆ๐š๐ฅ๐ฅ๐ฒ ๐ฐ๐จ๐ซ๐ค

Under normal circumstances, Entra B2B collaboration allows administrators to invite external guests into their tenant. The platform creates a guest account, sends an invitation, and walks the external user through a redemption process so they can access Teams, SharePoint, or other resources. Microsoftโ€™s documentation explains that invitations can be sent through the Entra admin center, PowerShell, or APIs, and that external collaboration settings control who can invite guests and how domains are restricted.

Furthermore, Entra external collaboration configuration includes options for domain allowlists or blocklists, guest visibility, and entitlement restrictions, all of which influence how B2B invitations move across environments.ย Because guest access underpins many modern partnerships, organizations often keep these paths open, and attackers take advantage of that openness.

๐“๐ก๐ž ๐“๐Ž๐€๐ƒ ๐œ๐š๐ฆ๐ฉ๐š๐ข๐ ๐ง: ๐ž๐ง๐ ๐ข๐ง๐ž๐ž๐ซ๐ข๐ง๐  ๐ญ๐ซ๐ฎ๐ฌ๐ญ ๐ฐ๐ข๐ญ๐ก ๐Ÿ๐š๐ค๐ž ๐ญ๐ž๐ง๐š๐ง๐ญ๐ฌ

In this specific Microsoft Entra tenant invitations TOAD campaign, adversaries create their own Entra tenants and assign names that resemble legitimate Microsoft-affiliated services, such as โ€œUnified Workspace Team,โ€ โ€œCloudSync,โ€ or โ€œAdvanced Suite Services.โ€ These labels appear plausible enough that busy users rarely question the origin. Once the infrastructure exists, the attackers send guest invitations from invites@microsoft[.]com, relying on the fact that the sender address and Entra branding match expectations for a real collaboration invite.

Inside the invitation, the message body contains a detailed scenario about a supposed ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐Ÿ‘๐Ÿ”๐Ÿ“ ๐š๐ง๐ง๐ฎ๐š๐ฅ ๐ฉ๐ฅ๐š๐ง renewal. The text lists fabricated reference numbers, customer IDs, and a charge of roughly ๐Ÿ’๐Ÿ’๐Ÿ”.๐Ÿ’๐Ÿ” ๐”๐’๐ƒ, which looks consistent with business-grade subscription pricing. The instructions urge the recipient to call a phone number labeled as Microsoft Billing Support to dispute or confirm the charge. That number routes to an attacker-run call center instead of any legitimate Microsoft support channel.

๐€๐ญ๐ญ๐š๐œ๐ค ๐ฌ๐ญ๐š๐ ๐ž๐ฌ: ๐Ÿ๐ซ๐จ๐ฆ ๐ข๐ง๐ฏ๐ข๐ญ๐š๐ญ๐ข๐จ๐ง ๐ญ๐จ ๐œ๐ซ๐ž๐๐ž๐ง๐ญ๐ข๐š๐ฅ ๐ญ๐ก๐ž๐Ÿ๐ญ

First, the victim receives the invitation email that appears to originate from Microsoftโ€™s infrastructure. Then, the billing narrative creates urgency and fear of an unwanted charge. As soon as the user calls the number, a TOAD script takes over. Numerous analyses of callback phishing show that operators typically walk victims through verification questions, pressure them into sharing Microsoft 365 credentials, and push them into remote-support sessions using legitimate remote-access tools.

During these calls, adversaries may reset passwords, enroll their own devices into conditional access flows, or register additional multi-factor authentication methods. Several public briefings on TOAD note that once attackers hold live phone control, they can sidestep many typical phishing indicators, because the victim willingly reads codes, approves prompts, and authorizes device registrations.

๐„๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ข๐ง๐  ๐ญ๐ก๐ž ๐„๐ง๐ญ๐ซ๐š ๐ข๐ง๐ฏ๐ข๐ญ๐š๐ญ๐ข๐จ๐ง ๐ฆ๐ž๐ฌ๐ฌ๐š๐ ๐ž ๐Ÿ๐ข๐ž๐ฅ๐

The campaign hinges on a subtle design gap in the Entra invitation process. The guest invitation message field accepts relatively long, free-form text. That flexibility allows the platform to carry collaboration context; however, it also lets attackers embed complete phishing scripts and billing stories directly into the invite. Public research on this specific attack notes that the primary motive is to exploit the message field rather than any code execution flaw.

Because the message rides inside an invite generated by Microsoft, many email security solutions treat it as benign system mail. Some defenders already document that callback phishing and TOAD emails often evade detection for the same reason: the content contains no obvious payloads, just text and a phone number.

๐ˆ๐ง๐๐ข๐œ๐š๐ญ๐จ๐ซ๐ฌ ๐ญ๐จ ๐ก๐ฎ๐ง๐ญ ๐Ÿ๐จ๐ซ ๐ข๐ง ๐ฅ๐จ๐ ๐ฌ ๐š๐ง๐ ๐ญ๐ž๐ฅ๐ž๐ฆ๐ž๐ญ๐ซ๐ฒ

Security teams can start by reviewing email and Entra audit logs for invitations sent from invites@microsoft[.]com that include:

โ€“ Tenant names matching or resembling the attacker patterns, such as x44xfqf.onmicrosoft[.]com, woodedlif.onmicrosoft[.]com, and xeyi1ba.onmicrosoft[.]com.
โ€“ Subject lines that indicate a generic invitation to access applications within another organizationโ€™s tenant.
โ€“ Message bodies that describe unexpected Microsoft 365 renewals or invoices, particularly around mid-value amounts like the ๐Ÿ’๐Ÿ’๐Ÿ”.๐Ÿ’๐Ÿ” ๐”๐’๐ƒ example.

Additionally, defenders can mine call-detail records, help desk notes, and security incident tickets for repeated reports of suspicious โ€œMicrosoft billingโ€ calls that tie back to a handful of phone numbers. Multiple industry write-ups highlight how TOAD activity often clusters around small sets of VoIP numbers that attackers recycle across campaigns.

๐‘๐ข๐ฌ๐ค ๐ข๐ฆ๐ฉ๐š๐œ๐ญ ๐Ÿ๐จ๐ซ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐Ÿ‘๐Ÿ”๐Ÿ“ ๐ญ๐ž๐ง๐š๐ง๐ญ๐ฌ

From a risk perspective, Microsoft Entra tenant invitations TOAD attacks matter because they blend three high-impact factors. First, they rely on legitimate Microsoft infrastructure, which reduces the chance of outright blocking. Second, they drive victims directly into phone-based social engineering, where technical controls lose influence and user behavior becomes the main defense line. Third, they specifically target identity and access: the attacker wants account credentials, MFA codes, or device enrollment approvals.

As several TOAD case studies note, successful callback phishing often leads to lateral movement inside cloud tenants, data exfiltration, and business email compromise rather than just a single mailbox takeover. Once adversaries hold valid tokens and devices, many downstream controls treat them as normal users.

๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐œ๐จ๐ง๐ญ๐ซ๐จ๐ฅ๐ฌ: ๐ฌ๐ญ๐ซ๐ž๐ง๐ ๐ญ๐ก๐ž๐ง๐ข๐ง๐  ๐„๐ง๐ญ๐ซ๐š ๐ž๐ฑ๐ญ๐ž๐ซ๐ง๐š๐ฅ ๐œ๐จ๐ฅ๐ฅ๐š๐›๐จ๐ซ๐š๐ญ๐ข๐จ๐ง

To reduce exposure, organizations should revisit Microsoft Entra external collaboration settings with TOAD in mind. Microsoftโ€™s guidance outlines how to constrain which roles can invite guests, how to restrict domains, and how to limit guest user capabilities inside the directory.

Teams can tighten guest invitation flows by limiting invitation rights to specific admin roles, applying explicit domain allowlists for B2B collaboration, and regularly reviewing guest accounts for unusual naming patterns or inactivity. Additionally, security operations centers can integrate KQL-based hunting queries against Entra sign-in and audit logs to surface suspicious spikes in guest invitations or repeated invitations from newly created tenants.

๐”๐ฌ๐ž๐ซ ๐š๐ฐ๐š๐ซ๐ž๐ง๐ž๐ฌ๐ฌ ๐Ÿ๐จ๐ซ ๐œ๐š๐ฅ๐ฅ๐›๐š๐œ๐ค ๐š๐ง๐ ๐“๐Ž๐€๐ƒ ๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ

Technical controls alone will not stop Microsoft Entra tenant invitations TOAD attacks. Therefore, organizations need targeted awareness campaigns that explain callback phishing in clear language. Training should emphasize that:

โ€“ Users must distrust any billing-related email or invitation that demands a phone call to resolve an unexpected charge.
โ€“ Staff should call official support numbers retrieved from the organizationโ€™s internal portal or Microsoftโ€™s official site, never from the body of an email or Entra invitation.
โ€“ Employees must report any suspicious Microsoft billing calls to security teams, especially when combined with recent Entra invitations.

Government and financial-sector advisories already warn that TOAD and voice-phishing scams rely on urgency, confusion about charges, and trust in the phone channel.ย When users understand that a legitimate-looking invitation can still be weaponized, they become more resilient to these blended social engineering attacks.

4 thoughts on “Hackers Exploit Microsoft Tenant Invitations for TOAD Phishing

Leave a Reply

Your email address will not be published. Required fields are marked *