The Disney Email Wasn’t From Disney
The email looked legitimate.
The Disney branding looked real. The layout looked polished. The message sounded calm, professional and believable.
It claimed there was an issue renewing a Disney subscription and urged the recipient to update their information to avoid interruption.
At first glance, it looked convincing.
But one detail broke the illusion completely.
The sender was MembershipCenterD+ <adu.apps@adu.ac.ae>.
Not Disney. Not a Disney-owned domain. Not even remotely related.
This Agent Foskett investigation follows a real-world phishing email using Microsoft Defender XDR telemetry, sender analysis, redirect inspection and KQL hunting techniques.
Briefing summary
A Microsoft Defender XDR investigation into a fake Disney subscription renewal email, sender mismatch, suspicious redirects, SendGrid tracking links and phishing infrastructure.
What happened
Why this kind of phishing works
First hunt: investigate the sender in EmailEvents
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
EmailEvents | where Timestamp > ago(30d) | where Subject has_any ("Disney", "subscription", "renewal", "update") | project Timestamp, SenderFromAddress, SenderMailFromAddress, RecipientEmailAddress, Subject, DeliveryAction, AuthenticationDetails, NetworkMessageId | order by Timestamp desc
Second hunt: inspect authentication details
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
EmailEvents | where Timestamp > ago(30d) | where SenderFromAddress has "adu.ac.ae" or Subject has_any ("subscription", "renewal", "update") | project Timestamp, SenderFromAddress, SenderMailFromAddress, Subject, DeliveryAction, AuthenticationDetails | order by Timestamp desc
Third hunt: review URL clicks and redirects
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
UrlClickEvents | where Timestamp > ago(30d) | where Url has_any ("sendgrid.net", "ziezokleurenstijl", "zug") | project Timestamp, AccountUpn, Url, ActionType, NetworkMessageId | order by Timestamp desc
Fourth hunt: find similar subscription phishing campaigns
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
EmailEvents | where Timestamp > ago(30d) | where Subject has_any ("subscription", "renewal", "update needed", "billing") | summarize Count=count() by SenderFromAddress, SenderMailFromAddress, Subject, DeliveryAction | order by Count desc
What this investigation shows
Final thoughts from Agent Foskett
But underneath the branding, the sender identity failed, the infrastructure looked suspicious and the redirect chain did not make sense.
The investigation did not start with malware.
It started with one simple question:
Why would Disney send billing emails from adu.ac.ae?
That one observation changed everything.
