Microsoft: Anti-phishing rules mistakenly blocked emails, Teams messages
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述即可。 首先,我需要通读文章,抓住主要信息。文章讲的是微软的Exchange Online出现了一个问题,导致合法邮件被错误隔离。问题是由错误的启发式检测规则引起的,这些规则本来是用来阻止凭证钓鱼攻击的。 接下来,时间范围是从2月5日开始,到2月12日才解决。受影响的用户包括Exchange Online和Teams的用户,他们无法打开邮件中的链接,有些邮件甚至被完全隔离了。管理员也收到了错误警报。 然后,根本原因是检测系统中的逻辑错误,导致大量合法URL被误判为钓鱼链接。其他安全工具也加剧了问题的影响,还有一个安全签名系统的漏洞进一步延迟了修复。 最后,微软已经发布了初步报告,并将在五个工作日内发布最终报告。过去几年中,微软还遇到过类似的问题,比如误判垃圾邮件或恶意邮件的情况。 现在要将这些信息浓缩到100字以内。重点包括:Exchange Online故障、启发式检测规则错误、隔离合法邮件、时间范围、影响范围、误报原因以及微软的应对措施。 可能的结构是:微软Exchange Online因启发式检测规则故障导致合法邮件被隔离一周;问题由逻辑错误引发,误判URL为钓鱼链接;影响用户收发邮件和Teams消息;微软已解决并发布报告。 </think> Microsoft's Exchange Online experienced a week-long issue where legitimate emails were mistakenly quarantined due to faulty heuristic detection rules targeting credential phishing. The problem, caused by a logic error, led to thousands of URLs being incorrectly flagged as phishing, blocking emails and Teams messages. Microsoft resolved the issue and published a preliminary report, attributing the incident to an error in detecting novel phishing campaigns. 2026-2-18 16:47:11 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

Exchange Online

Microsoft says an Exchange Online issue that mistakenly quarantined legitimate emails last week was triggered by faulty heuristic detection rules designed to block credential phishing campaigns.

As Microsoft explains in a preliminary post-incident report published this week, a software error in its email security system incorrectly flagged thousands of legitimate URLs as phishing links for nearly a week, blocking users from opening emails and Teams messages.

The incident, tracked by Microsoft under EX1227432, began on February 5 and was not fully resolved until February 12. During that period, users across Exchange Online and Microsoft Teams were unable to open links in messages, with some of their emails quarantined entirely.

Wiz

Administrators also received warnings that a "potentially malicious URL click was detected," alerts that Microsoft later confirmed were false positives.

The root cause was a logic error in a detection system designed to identify new credential phishing attacks. Shortly after the system was updated, it began flagging legitimate URLs at a far higher rate than intended, triggering a cascade of automated responses that aggravated the problem.

Other security tools within Microsoft's detection infrastructure also amplified the incident's impact, and a separate bug in the company's security signature systems further delayed efforts to roll back the flawed detection rules.

"This issue occurred due to a logic error in a heuristic detection aimed at novel credential phishing campaigns that spiked several hours after release," Microsoft explained.

"This spike in detection resulted in thousands of URL's being incorrectly identified as phishing, triggering blocks for newly delivered emails containing those URL's, ZAP events to remove email and Teams messages with those URL's in them, and also generating XDR alerts for click events related to these alerts."

Microsoft said that any user who received emails or Teams messages containing specific URLs may have been affected, but the company has yet to disclose the total number of impacted users. However, as BleepingComputer previously reported, Microsoft classified the issue as an "incident," which usually involves noticeable user impact.

While this preliminary report was published on Monday, Microsoft said that it will issue a final report within five business days of full resolution.

Microsoft has addressed other issues over the last several years that resulted in emails being quarantined or incorrectly tagged as spam or malicious. For instance, an Exchange Online bug caused a machine learning model to incorrectly flag emails from Gmail accounts as spam, while another one caused anti-spam systems to mistakenly quarantine some users' emails.

More recently, in September, an anti-spam service issue blocked Exchange Online and Microsoft Teams users from opening URLs and mistakenly quarantined some of their emails.

Microsoft is also working to fix a bug that allowed its AI-powered Microsoft 365 Copilot Chat to summarize confidential emails since late January.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/microsoft/microsoft-anti-phishing-rules-mistakenly-blocked-emails-teams-messages/
如有侵权请联系:admin#unsafe.sh