Signs of a Phishing Attempt Based on Office VoIP Voicemail Notifications

Crude Attempt That Could Trap the Unwary

With an increasing number of people using services like Teams for voice communications, scammers are trying out new ways to lure unsuspecting victims to click phishing links. One example is the message I received on Wednesday (Figure 1) purporting to let me know that a voicemail is waiting.

Don't click that Play Voice Message button
Figure 1: Don’t click that Play Voice Message button

The message is a pretty crude attempt to convince anyone that it is a real voicemail notification. “Office VoIP” is used instead of a more believable service name (like Teams, Office 365, Microsoft 365) and the text contains spelling and grammar errors. The Play Voice Message button is clunky and the message comes from an account featuring three exclamation marks in its display name and an SMTP address of

Domain Built for an Attack

Looking up the domain with WhoIS, we find that it was registered on October 26 with The message header tells us that the email came from, probably an SMTP server in a Western European datacenter that’s part of Amazon’s simple email service. In short, the domain was set up with the intention of being used for phishing attacks.

Outlook’s message header analyzer also tells us that the message passed Exchange Online Protection’s mail authentication anti-spam checks. The SPF pass is because the message came from a server authorized to send by Amazon. DKIM signature validation worked and DMARC’s result was a best guess pass.

spf=pass (sender IP is;; dkim=pass (signature was verified);; dmarc=bestguesspass action=none;compauth=pass reason=109

The link to play the purported voicemail looks as if it will access a PDF file. I didn’t bother going any further.

I’ve reported the message to Microsoft so that they can take steps to block future attempts from the same source. Outlook’s Report Message add-in makes this very easy.

User Education

The problem with messages like this is that people often don’t look at the sender name or domain, question why large commercial organizations send poorly constructed messages, or even why they might be receiving such a message. The fear of losing out syndrome is exploited by attackers who rely on curiosity to lead people to click links. All we can do is continue to educate users to be careful and mistrust messages received from unknown sources.

For more information on running effective message hygiene defenses (a jazzy name for anti-spam), read Chapter 7 of the Office 365 for IT Pros eBook.

One Reply to “Signs of a Phishing Attempt Based on Office VoIP Voicemail Notifications”

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.