Key Takeaways
- Email forwarding can inadvertently bypass DMARC protections.
- Microsoft’s SRS can “launder” malicious emails, making them appear trusted.
- LaunDroMARC affects both internal and external forwarded messages.
- Continuous monitoring and visibility are crucial for email security.
- PowerDMARC provides tools to detect and mitigate such forwarding loopholes.
Security researcher Aaron Hart was investigating what looked like a regular business email compromise attempt. But the deeper he looked, the stranger it became. Everything about the attack appeared polished and believable: the sender domain, the authentication results, and the path the email took.
Yet something impossible had happened. An email that failed DMARC at the source was magically passing DMARC after being forwarded through Microsoft Exchange Online.
This shouldn’t be possible. But it was – and it was happening because of a side-effect of Microsoft’s Sender Rewriting Scheme (SRS) implementation.
This blog breaks down the issue in simple language, originally shared by Engage Security, explaining how the loophole works and how organizations can detect and mitigate the risk.
How Microsoft SRS Causes DMARC Bypass
During the investigation, Aaron noticed:
- The email claimed to be from a trusted internal domain (ORG 1).
- It was delivered to the user’s inbox at a different organization (ORG 2).
- ORG 2 saw the message as perfectly authenticated, i.e., SPF pass, DMARC pass.
- But the original email sent to ORG 1 from the attacker failed DMARC.
- Microsoft’s SRS forwarding rewrote the MAIL FROM during forwarding.
- The rewritten MAIL FROM created alignment, making DMARC pass downstream.
In short: A spoofed email that should have been rejected got forwarded, rewritten, and “washed clean”, then delivered as a trusted message. This resulted in a real-world account compromise, and it wasn’t a one-off.
Why This Matters
Email forwarding is extremely common across organizations:
- Consultants forwarding client emails
- Board members forwarding corporate addresses to personal mailboxes
- Shared mailboxes or distribution lists routing mail externally
- Inter-org collaboration groups
Since 2023, Microsoft has enabled SRS for all Exchange Online tenants, intending to fix SPF failures caused by email forwarding. Unfortunately, this fix created a new problem: forwarded malicious emails now appear fully authenticated, even when they originally failed DMARC.
This phenomenon has now been dubbed “LaunDroMARC” because the forwarding process literally “launders” malicious messages.
A Quick Refresher: SMTP, SPF, DKIM & DMARC
MAIL FROM vs FROM
- MAIL FROM (Envelope From): invisible to users and used for bounce handling.
- FROM: visible sender in your inbox.
SPF
Sender Policy Framework verifies whether the sending server is allowed to send mail for the MAIL FROM domain. SPF does not validate the visible FROM address and breaks on forwarding (forwarders aren’t in the sender’s SPF record).
DKIM
DomainKeys Identified Mail digitally signs email headers, including the FROM. Attackers can potentially DKIM-sign their own malicious domains, highlighting one of the weaknesses of the protocol.
DMARC
Domain-based Message Authentication, Reporting, and Conformance fixes alignment problems by requiring MAIL FROM domain to match the FROM domain, or the DKIM signing domain to match the FROM domain, in order to pass authentication. If alignment fails, the domain’s DMARC policy tells receivers whether to deliver, quarantine, or reject the message.
DMARC significantly reduced spoofing until this loophole reintroduced it.
Where Things Broke: Microsoft’s SRS Implementation
SRS was introduced to prevent SPF failures during forwarding. But Microsoft’s implementation has a critical gap:
Microsoft rewrites the MAIL FROM even when:
- The original email spoofs the FROM address of the forwarding domain.
- The spoofed email fails DMARC at the first hop.
- The message originates from an attacker-controlled domain.
Once rewritten using SRS, the MAIL FROM now aligns with the FROM domain, making DMARC pass at the final destination.
The outcome: a malicious email that should normally fail DMARC ends up being forwarded, rewritten by SRS, and perfectly aligned with the forwarding domain’s authentication records. As a result, it’s delivered to the recipient as a fully legitimate message. In short, spoofing through email forwarding becomes possible again, undoing the protections DMARC was designed to provide.
Microsoft currently does not treat this as a security vulnerability.
Example Scenario
Imagine an attacker controlling the domain maliciousmailer.com, with SPF records configured to allow sending from IP 198.51.100.25. They craft an email intended for a consultant, Sarah, whose work email is sarah@company.com but is automatically forwarded to her personal mailbox at sarah@personalmail.com.
The attacker sets the email headers as follows:
- MAIL FROM: attacker@maliciousmailer.com
- FROM: Sarah sarah@company.com (spoofed to appear internal)
- To: sarah@company.com
When sent, SPF validation passes because the MAIL FROM domain is controlled by the attacker. When the email reaches company.com, Exchange Online processes it with SRS: it ignores the DMARC failure on the spoofed FROM, rewrites the MAIL FROM to align with the forwarding domain (e.g., sarah+SRS=…@company.com), and forwards it to Sarah’s personal mailbox.
At personalmail.com, DMARC now passes because the rewritten MAIL FROM and the visible FROM are aligned. The email is delivered to Sarah’s inbox looking legitimate, effectively bypassing the protections that should have stopped it.
In short, a spoofed message that should have been blocked is now trusted by the recipient, illustrating how SRS can inadvertently “launder” malicious emails.
Why LaunDroMARC Is Dangerous for Organizations
This vulnerability is dangerous because users naturally trust emails that appear to come from their own organisation or a familiar internal domain. When malicious emails are forwarded, they bypass the original security checks and arrive looking clean and legitimate.
Attackers exploit predictable forwarding rules to exploit this blind spot, while security teams often focus on inbound threats rather than on forwarded mail. As a result, this loophole opens the door to serious risks, including sensitive data theft, credential harvesting, internal spear-phishing, and even supply chain impersonation attacks.
What Microsoft Could Fix
There are several straightforward mitigations Microsoft could implement:
- Don’t rewrite MAIL FROM via SRS if the FROM header belongs to the forwarding domain but fails DMARC at the initial hop.
- Only apply SRS to messages that pass DMARC from the sender.
- Compare Authentication-Results headers before and after forwarding.
If they don’t match, quarantine the message.
How Organizations Can Detect LaunDroMARC
1. The Forwarding Domain (Exchange Online)
You can spot potential abuse by looking for emails where the MAIL FROM domain is external, but the FROM header appears to belong to your organisation. These messages often show a pattern of passing SPF while failing DMARC: a red flag in the context of SRS rewriting. When those same messages are later forwarded outbound, it becomes a strong indicator that your forwarding rules are being used to relay spoofed or malicious content.
2. The Final Recipient Domain
If an email shows alignment between the visible FROM address and the rewritten MAIL FROM, but the original MAIL FROM domain buried inside the SRS value doesn’t match either one, it’s a strong indicator that the message has been “laundered” through forwarding and may be a spoofed or malicious email.
PowerDMARC’s Perspective
As a platform dedicated to strengthening global email authentication, issues like LaunDroMARC highlight why monitoring and visibility matter as much as enforcement. Even when standards like DMARC are deployed correctly, implementation gaps at mailbox providers can create vulnerabilities outside your control.
PowerDMARC helps organizations:
- Analyze authentication results across all hops
- Detect alignment anomalies and forwarding behavior
- Receive real-time alerts on spoofing attempts
- Understand how third-party systems handle forwarded mail
- Monitor cross-domain traffic for spoofing patterns
- Maintain visibility into attacks that exploit forwarding chains
Take a free trial or schedule a demo with one of our in-house experts to start protecting your domain today!
Final Thoughts
The LaunDroMARC issue reopens an attack vector that DMARC was designed to stop, making internal domain spoofing possible again through forwarded mail. While Microsoft currently views this as “low risk,” real-world compromises prove otherwise.
Organizations relying on Microsoft 365 must be aware of this forwarding loophole and put additional detection measures in place.
- Email Security Basics for Students - December 26, 2025
- Self-Hosting Email in 2026: Is Running a Linux Mail Server Still Worth It? - December 26, 2025
- Suped Alternatives: Top DMARC Management Platforms in 2026 - December 25, 2025
