← Back to SOC feed Coverage →

Top 10 External senders sending Teams phishing messsages

kql MEDIUM Azure-Sentinel
T1562
huntingmicrosoftofficialphishing
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-12T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may use external senders to distribute phishing messages via Teams to compromise user credentials and spread malware. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential credential theft and lateral movement attempts.

KQL Query

//This query looking for top 10 External senders sending Team phishing messsages
 MessageEvents
 | where IsOwnedThread==0 and IsExternalThread==1
 | where ThreatTypes has "Phish"
 | summarize Count = count() by SenderEmailAddress
 | top 10 by Count

Analytic Rule Definition

id: 9432f895-763d-4e9b-b9bf-680296ce6c0d
name:  Top 10 External senders sending Teams phishing messsages
description: |
  This query looking for top 10 External senders sending Team phishing messsages.
description-detailed: |
  This query looking for top 10 External senders sending Team phishing messsages.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - MessageEvents
tactics:
  - DefenseEvasion
relevantTechniques:
  - T1562
query: |
 //This query looking for top 10 External senders sending Team phishing messsages
  MessageEvents
  | where IsOwnedThread==0 and IsExternalThread==1
  | where ThreatTypes has "Phish"
  | summarize Count = count() by SenderEmailAddress
  | top 10 by Count
version: 1.0.0

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Microsoft Teams protection/Top 10 External senders sending Teams phishing messsages.yaml