The Email Passed SPF… But Was Still Malicious
SPF passed.
DKIM passed.
DMARC passed.
Microsoft 365 accepted the message. No high-severity alert triggered. The sender looked legitimate.
But something still felt wrong.
The user had received an email from a trusted supplier they communicated with regularly. The branding matched. The conversation thread looked genuine. The authentication checks all passed successfully.
Yet the investigation uncovered suspicious reply-to behaviour, unusual redirection patterns and indicators of account compromise.
This Agent Foskett briefing investigates a dangerous Microsoft 365 reality: authentication success does not always mean the email is safe.
Briefing summary
Emails can successfully pass SPF, DKIM and DMARC authentication while still being malicious. GEMXIT investigates suspicious email behaviour, reply-chain abuse and compromised trusted senders inside Microsoft Defender XDR.
What happened
Why SPF pass does not always mean safe
First hunt: review authentication results
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
EmailEvents | where Timestamp > ago(7d) | where AuthenticationDetails has "spf=pass" | project Timestamp, SenderFromAddress, RecipientEmailAddress, Subject, AuthenticationDetails, ThreatTypes, DeliveryAction, NetworkMessageId | order by Timestamp desc
Second hunt: investigate suspicious reply chains
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
EmailEvents | where Timestamp > ago(14d) | where Subject has_any ("RE:", "FW:", "invoice", "payment") | project Timestamp, SenderFromAddress, ReplyToAddress, Subject, RecipientEmailAddress, AuthenticationDetails, ThreatTypes, NetworkMessageId | order by Timestamp desc
Third hunt: investigate URL behaviour
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
UrlClickEvents | where Timestamp > ago(7d) | project Timestamp, AccountUpn, Url, ActionType, IPAddress, NetworkMessageId | order by Timestamp desc
Where this becomes dangerous
What should organisations do?
How GEMXIT approaches Microsoft Defender email investigations
Final thought
DKIM is important.
DMARC is important.
But authentication alone is not the full investigation.
Sometimes the most dangerous emails are the ones that technically look legitimate.
It is: “Should this email still be trusted?”
Continue the investigation with DMARC Failed But Delivered, SpoofedDomain EmailEvents KQL, The Email Came From Me, AuthenticationDetails Explained, Email Spoofing Detection Guide, The Disney Email Wasn't From Disney, Microsoft Defender, Security Operations and the GEMXIT Security Review.
Develop IT. Protect IT. GEMXIT PTY LTD | GEMXIT UK LTD