Your Defender Is On. So Why Is CEO Impersonation Still Working?

Defender being “on” isn’t enough. Why CEO impersonation still works in Microsoft 365 - and how misconfigured trust exposes organizations to fraud.
SHARE THIS BLOG:
Table of contents
1. This Is Not Theoretical. These Attacks Cost Millions.
2. These Companies Had Email Security.
3. Why “Defender On” Is Not the Same as “Defender Done”
4. What “Good” Actually Looks Like in Microsoft 365
• Explicit Executive Impersonation Protection
• Automated Response, Not Human Hope
• Least Trust for High‑Authority Roles
5. The Licensing Reality Many CXOs Miss
6. Final Thought for CXOs

I have helped dozens of organizations secure their Microsoft 365 tenants.

And yet, one uncomfortable truth keeps showing up.

Executive impersonation attacks are still working. Even in tenants where Microsoft Defender is already enabled.

This is not a tooling problem. This is a configuration, licensing, and zero‑trust execution problem.

And the financial impact is very real.

This Is Not Theoretical. These Attacks Cost Millions.

Let’s ground this in facts, not fear.

Google and Facebook – Over $120M Lost
Finance teams received what looked like normal vendor invoices. The sender identity, domain, and language matched expectations.

Over time, more than $100M was wired out.

There was no malware. No exploited vulnerability. No breached servers.

Just trust abused at scale.

FACC AG – About €50M Lost
A single impersonated CEO email triggered fraudulent wire transfers tied to a “confidential acquisition.”

The request appeared legitimate. It referenced sensitive business context. It carried the authority of the CEO.

By the time the fraud was detected, tens of millions were gone. The incident ultimately resulted in the dismissal of senior leadership.

These Companies Had Email Security.

What they lacked was identity‑aware enforcement and least‑privilege trust.

The FBI continues to report business email compromise as one of the highest‑loss cybercrime categories globally, with annual losses consistently measured in the billions. Executive impersonation remains the most successful variant because it exploits authority, urgency, and implicit trust.

Why “Defender On” Is Not the Same as “Defender Done”

Here is what I see repeatedly during Microsoft 365 security assessments:

  • Defender is licensed, but impersonation protection is not explicitly configured
  • Anti‑phishing policies exist, but executives are not defined as high‑value targets
  • Domain and user impersonation detection is enabled, but response is manual
  • Security teams assume SPF, DKIM, and DMARC are enough - they are not

Impersonation emails often pass email authentication by design. That is exactly what makes them dangerous.

What “Good” Actually Looks Like in Microsoft 365

This is what aligning Defender with zero‑trust principles actually requires.

1. Explicit Executive Impersonation Protection

  • Define protected users such as CEO, CFO, and board members
  • Enable user and domain impersonation detection
  • Apply strict actions like quarantine, not just tagging

This capability exists only in Microsoft Defender for Office 365 - not in basic Exchange protection.

2. Automated Response, Not Human Hope

  • Automated investigation and remediation
  • Alerts routed directly into SOC workflows
  • Immediate quarantine and user notifications

This requires Defender for Office 365 Plan 2 or Microsoft 365 E5.

Without automation, response speed depends on human availability - and attackers know it.

3. Least Trust for High‑Authority Roles

Executives should not receive broader email trust just because they are executives.

  • No implicit trust for “internal‑looking” emails
  • Stronger enforcement for finance and authority‑based requests
  • Regular review of impersonation insights in the Defender portal

Zero trust means authority does not equal exemption.

The Licensing Reality Many CXOs Miss

Let’s be very clear:

  • Executive impersonation protection requires Microsoft Defender for Office 365
  • Advanced automation and investigation require Plan 2 or E5
  • E1, E3, F3, or Exchange‑only licensing is not sufficient for full protection

This is not an upsell. It is a design constraint.

Final Thought for CXOs

Most executives believe impersonation attacks are an employee awareness problem.

They are not.

They are a trust boundary failure.

If your tenant allows an email that “looks right” to bypass enforcement simply because it references an executive, then zero trust is already broken.

And attackers know it.

If you want to know whether your Defender configuration would have stopped a real‑world CEO impersonation attack, the answer is usually uncomfortable.

I’m happy to help organizations validate that assumption before someone else does it for them.

Jasjit Chopra
Jasjit Chopra

CEO at Penthara Technologies

About the Author

Microsoft MVP LogoLinked-in

Jasjit Chopra is the CEO of Penthara Technologies and a Microsoft Most Valuable Professional (MVP) with over two decades of hands-on experience in Microsoft 365, SharePoint, and Security. He has led 100+ digital transformation projects across six countries, securing 50,000+ users, migrating 250+ TB of data, and automating processes that save organizations thousands of hours each year. A recognized leader at the crossroads of AI, security, and workplace modernization, Jasjit is passionate about simplifying complexity, mentoring technology professionals, and helping businesses build secure, intelligent, and future-ready digital environments.

Leave a Reply

Your email address will not be published. Required fields are marked *

More From This Category

Your Microsoft 365 Tenant Has a Silent Data Leak. It Requires No Malware.

Your Microsoft 365 tenant can leak data silently - no malware, no alerts. Learn how simple misconfigurations enable ongoing email and data exfiltration.

Read More
Security Alerts That Nobody Investigates - And Why That’s More Dangerous Than Having None

Security alerts mean nothing if no one investigates them. Ignored alerts create false confidence - and give attackers the time they need to cause real damage.

Read More
The Silent M365 Risk Most CXOs Discover Too Late: External Access That Never Expired

A hidden Microsoft 365 risk many CXOs overlook - expired external access that quietly breaks Zero Trust and exposes organizations to serious security gaps.

Read More
1 2 3 11
chevron-right