Microsoft has recognized a problem in its cloud mail platform that since Thursday has intermittently prevented some users from accessing their Online Exchange mailboxes from Outlook mobile applications and from the new Outlook version for Mac. The company has classified it as an incident - that is, a failure with a significant impact on the service - and, although it has not disclosed how many people or which regions are affected, it is already working on a solution.
After investigating what happened, Microsoft determined that the root cause was related to the introduction of a recently added virtual account to the service. This type of account is often used internally to automate tasks or to support service components without relying on human identities, but in this case the change caused unexpected behaviors that ended up affecting specific customers. After trying to restore normal by reopening the infrastructure involved - a usual measure when suspected of inconsistent states or blocked processes - the company decided to reverse the modification as a possible longer-term solution.

In their communications, Microsoft explained that they were deactivating the change in affected environments and that, once they had a clearer resolution window, they would communicate it. If you want to see the official message registered by Microsoft at its management center, you can consult it in the technical notice: EX1256020. In addition, to check the general status of Microsoft 365 services it is recommended to review the status panel: Microsoft 365 Service Status.
The pattern of affections described so far speaks of an error that appears and disappears: some users can open their mail without problems and others find specific blockages or failures as they try to access from certain applications. This intermittent nature complicates both detection and mitigation, because something that works at time X can fail at time Y without an obvious pattern for the end user.
This incident is in addition to a recent streak of interruptions in Exchange Online services. Just a week ago, Microsoft solved another cut that affected different access routes to mailboxes and calendars - including Web Outlook, Desktop Outlook and Exchange ActiveSync - and, on the same day, also remedied a separate problem that caused access errors to Office.com and the login functions of Microsoft 365 Copilot due to a high traffic volume. Microsoft usually publishes such warnings at its management center; in the past they have addressed similar interruptions that blocked access by IMAP4 or that affected the classic Outlook client on different dates.
Understanding why an apparently small change, such as creating or activating a virtual account, can trigger an incident requires looking at several layers: the way services authenticate and authorize customers, how sessions are managed, and what validations are executed when different customers (mobile app, new desktop client, classic client, old protocols such as IMAP or Exchange ActiveSync) are connected to the same service. If a new identity is not properly registered, propagated or linked to the rules of authorisation, it can generate errors that manifest in very different ways depending on the client and the access route. For a technical overview of Exchange Online and its components, Microsoft's documentation center is a useful reference: Exchange Documentation.
If you are an IT administrator or affected user, what can you do while Microsoft unfolds the reversal and confirms the resolution? The first thing is to check the service status panel and any communication in the management center for your tenant. If you depend on mobile access or the new Mac app, try alternatives such as web access temporarily, as often the web console remains available even when certain native customers fail. Keep users informed and document the incidents with reproducible times and steps, because this information helps support teams to correlate errors and accelerate mediation.

It is understandable that occasions like this raise doubts about the stability of platforms in the cloud. The great advantage of services like Exchange Online is that Microsoft can apply centralized changes and reverse them quickly without each client having to install local patches; the counterpart is that an adjustment in global infrastructure can have extensive and unforeseen effects if not all interdependencies are detected. In any case, the usual response in these scenarios includes diagnosis, quick recovery attempts (such as controlled rebeginnings), and if that doesn't work, the reversal of problem change, as Microsoft has indicated in its note.
To keep abreast of new developments and analyses, specialized means often cover these incidents with additional details and context on impact in companies and users. Sources like BleepingComputer, ZDNet or the official status account on Twitter @ MSFT365Status may be useful to follow evolution.
In summary, Microsoft has detected that the activation of a recently introduced virtual account caused intermittent failures in access to Exchange Online from certain customers. After attempting to restart the affected infrastructure without complete success, the company is deploying the change reversal as a corrective measure and will report a resolution schedule when available. Meanwhile, the recommendation is to monitor the state of service, use alternative access where possible and document incidents to facilitate correlation with support equipment.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...