Microsoft Teams: Open gateway for cybercriminals

Microsoft Teams: Open gateway for cybercriminals

Share post

Many authorities and companies use Microsoft products, the Microsoft Office product range with teams in particular is very popular, also in the cloud version. As Proofpoint's security experts have shown in the past, this cloud migration brings new cyber risks, such as phishing, stolen logins and identities.

Attackers are currently increasingly targeting cloud environments and services and trying to exploit existing security gaps and vulnerabilities for their own purposes. In recent months and years, cybercriminals have used Microsoft services for attacks and, for example, effectively used Microsoft Sway as a weapon, bypassing security measures.

Many Microsoft applications are under attack

🔎 The ten most attacked login applications from Microsoft in the second half of 2022 (Image: Proofpoint).

Sway is far from the only Microsoft application being abused by cybercriminals. Proofpoint security researchers recently analyzed over 450 million attacks targeting Microsoft 2022 cloud tenants in the second half of 365. According to the analysis results, Microsoft Teams is among the ten most frequently attacked applications. Almost 40 percent of the organizations attacked had at least one unauthorized login attempt.

Reason enough for Proofpoint to take a closer look at the Microsoft application Teams. During their investigation, the experts uncovered multiple Microsoft Teams abuse methods, which cybercriminals effectively use to phish M365 credentials, distribute dangerous executables and propagate their access in a compromised cloud environment. These tactics include:

  • Post-account compromise impersonation and manipulation techniques, including the use of tabs to phish or distribute malware.
  • Abusing meeting invitations by replacing standard URLs with malicious links.
  • Abusing messages by replacing existing URLs with malicious links.

The attack methods examined by Proofpoint require access to a compromised user account or a teams token. By 2022, around 60 percent of M365 subscribers will have at least one successful account takeover. As a result, there is significant potential for attackers based on Teams capabilities to move laterally into victim systems following a compromise.

M365 subscribers: accounts cracked at 60 percent

Analysis of past attacks and current trends within the cloud threat landscape also shows that attackers are increasingly adopting more advanced attack methods. The use of new attack techniques and tools combined with apparent security flaws, including dangerous features in third-party applications, exposes organizations to a variety of major risks.

In addition, cybercriminals are constantly looking for new ways to steal user credentials and gain access to user accounts. As Proofpoint's latest research illustrates, Microsoft Teams can be used as a platform for various forms of cloud attacks as it is a legitimate and popular cloud application.

The Proofpoint experts have published the complete investigation in a blog, in which the attack methods are explained in detail using screenshots.

More at Proofpoint.com

 


About Proofpoint

Proofpoint, Inc. is a leading cybersecurity company. The focus for Proofpoint is the protection of employees. Because these mean the greatest capital for a company, but also the greatest risk. With an integrated suite of cloud-based cybersecurity solutions, Proofpoint helps organizations around the world stop targeted threats, protect their data, and educate enterprise IT users about the risks of cyberattacks.


 

Matching articles on the topic

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more

Campaigns by cybercriminal group TA4903

Cybersecurity experts have identified new campaigns by cybercriminal group TA4903 focused on phishing and business email compromise (BEC, also known as CEO fraud). ➡ Read more

Solar energy systems – how safe are they?

A study examined the IT security of solar energy systems. Problems include a lack of encryption during data transfer, standard passwords and insecure firmware updates. trend ➡ Read more