Security experts have warned of a huge uptick in automated phishing activity abusing the Axios user agent and Microsoft’s Direct Send feature.
ReliaQuest claimed in a new report today that it observed a 241% increase in phishing activity using Axios between June and August 2025. Axios accounted for nearly a quarter (24%) of all malicious user-agent activity analyzed in the period, making it 10 times more common than any other agents tracked by ReliaQuest.
The threat intelligence vendor said Axios-powered attacks had a 58% success rate versus just 9% for incidents without the user agent.
What started as a campaign targeting executives and managers in sectors like finance, healthcare and manufacturing has now broadened to regular internet users, it added.
Read more on phishing: Tycoon Phishing Kit Utilizes New Capabilities to Hide Malicious Links
Axios is a lightweight, promise-based HTTP client that enables attackers to scale their phishing campaigns with little effort, the report claimed.
Although a legitimate tool, the agent’s ability to intercept, modify and replay HTTP requests with ease and blend seamlessly into workflows makes it particularly prized.
“Its promise-based API and middleware interceptors let attackers log, tweak, replay, and troubleshoot easily. This makes it easier to bypass multifactor authentication (MFA), hijack session tokens, and tailor attacks to each target,” said ReliaQuest.
“In the Axios activity we saw, QR codes and phishing domains set the trap, then Axios let attackers exploit the data they captured. In the incidents we observed, Axios played a pivotal role in interacting with APIs and bypassing MFA protections.”
Other user agents require threat actors to write complex custom scripts or rely on tools that are more obviously suspicious, whereas Axios combines flexibility and easy automation, and will pass most user-agent analysis and reputation-based filter checks, the report noted.
Direct Send Amplifies Attacks
ReliaQuest noted that attacks that paired Axios with Microsoft’s Direct Send achieved an even higher (70%) success rate in recent campaigns.
That’s because Direct Send is typically trusted by security tools by default.
“Together, Direct Send and Axios form a highly efficient attack pipeline: Direct Send delivers phishing emails that appear legitimate, while Axios automates backend workflows like intercepting MFA tokens and authenticating stolen credentials,” the report explained.
“This seamless system allows attackers to operate at scale with minimal effort, blending into legitimate Axios traffic and evading detection.”
ReliaQuest urged organizations to mitigate the threat of Axios abuse by:
- Disabling Direct Send if not needed. If it is used, organizations are urged to enforce stricter controls and route internal email activity through an email security gateway for threat inspection, like scanning for malicious QR codes, URLs or PDF attachments
- Configure anti-spoofing policies on email gateways to block emails pretending to come from trusted sources
- Train all users, including executives, to recognize phishing emails with subject lines like “MEM0,” “0VERDUE,” and “INV0ICE”
- Block uncommon top-level domains like .es and .ru unless required for business reasons