Threat Intelligence

The Teams Invite That Came From the Wrong Domain: Display-Name Impersonation With All-Legitimate Links

Written by Audian Paxson | May 11, 2026 11:00:00 AM
TL;DR A Microsoft Teams notification email arrived at a regional banking institution with a display name matching an internal employee exactly. SPF and DKIM passed at the initial authentication hop via a Microsoft 365 tenant. Every link in the message resolved to legitimate Microsoft domains (teams.microsoft.com, aka.ms, go.microsoft.com). A downstream Votiro CDR relay broke authentication alignment, but the original cryptographic validation was clean. The only anomaly was the sender address: an external .us domain with no prior relationship to the recipient organization. No credential forms. No malicious URLs. No attachments. The entire attack surface was trust in a familiar name.
Severity: High Impersonation Platform Abuse MITRE: T1566.002 MITRE: T1036.005 MITRE: T1204.001

An employee at a regional banking institution received a Microsoft Teams notification: "You have been added to a team in Microsoft Teams." The display name matched an internal contact exactly. Every link in the message pointed to teams[.]microsoft[.]com, go[.]microsoft[.]com, or aka[.]ms. SafeLinks rewrites decoded to the same legitimate Microsoft domains. The sender address, however, belonged to usafederal[.]us, an external domain with no prior relationship to the recipient organization.

Technical Breakdown

The email replicated a standard Microsoft Teams invitation. The "Open Microsoft Teams" button, footer layout, and notification structure all matched legitimate Teams emails. Some branding assets were hosted on wixstatic[.]com rather than Microsoft CDN, a minor anomaly but not one most recipients would notice.

At the initial authentication hop, SPF and DKIM both passed for usafederal[.]onmicrosoft[.]com. The sending tenant was a real Microsoft 365 environment. The message then transited through a Votiro Content Disarm and Reconstruction (CDR) relay at votiro-relay2[.]prod[.]votiro[.]com (44[.]206[.]222[.]91). Votiro modified the message body during sanitization, which broke DKIM body-hash alignment. The relay IP was not in the sender domain SPF record, so SPF also failed at the downstream hop.

The result: the final authentication record showed SPF fail and DKIM fail, but the original cryptographic validation was clean. Organizations running CDR in their mail flow see this pattern routinely with legitimate messages, which trains security teams and automated systems to discount authentication failures from known relay infrastructure.

See Your Risk: Calculate how many threats your SEG is missing

Why This Attack Is Invisible to Authentication and Content Scanning

There is nothing malicious in this message by any conventional definition. No credential harvesting forms. No urgency language. No suspicious attachments. Every URL resolves to a Microsoft-owned domain. A secure email gateway scanning links and attachments would find zero indicators to act on.

SPF, DKIM, and DMARC validate the sending domain, not the display name. An attacker can set any display name they choose while sending from a fully authenticated external tenant. The recipient sees a familiar name and a familiar notification format. The domain mismatch is buried in headers that most email clients hide by default.

The attack surface here is not technical. It is relational. The goal is to establish the sender as a trusted internal contact so the recipient engages with a follow-up message or simply normalizes the external sender in their inbox. This is reconnaissance for a future social engineering attempt, delivered through a notification the recipient was trained to trust.

What Behavioral Detection Sees That Authentication Cannot

The signals that discriminate this message from a legitimate Teams notification are behavioral. The sender address belongs to an external domain with zero prior communication history. The display name matches an internal contact exactly, consistent with targeted impersonation. The sending domain operates in a different industry and geography than the recipient. These are the signals that behavioral detection models evaluate, invisible to authentication-layer defenses.

Across the IRONSCALES community-driven threat intelligence network, display-name impersonation using legitimate platform notifications represents a growing pattern. The absence of any malicious payload makes these messages particularly difficult for traditional tools. Detection depends on understanding who is writing to whom, not what the message contains.

Indicators of Compromise

TypeIndicatorContext
Sending Domainusafederal[.]usExternal .us domain, no prior relationship to recipient
Sending Tenantusafederal[.]onmicrosoft[.]comM365 tenant used for initial authentication
CDR Relayvotiro-relay2[.]prod[.]votiro[.]comVotiro relay that broke DKIM/SPF alignment
Relay IP44[.]206[.]222[.]91Votiro relay IP address
Branding Hostwixstatic[.]comNon-Microsoft asset hosting in a Teams notification
Footer ReferenceUSA Federal, Edinburg, TXOrganization footer in a Teams-formatted email
Link Domains (legitimate)teams[.]microsoft[.]com, go[.]microsoft[.]com, aka[.]msAll links resolved to real Microsoft domains
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.