Security News > 2020 > April > Microsoft Teams Vulnerability Exposed Organizations to Attacks
![Microsoft Teams Vulnerability Exposed Organizations to Attacks](/static/build/img/news/alt/phishing-statistics-cybersecurity-scaled-medium.jpg)
The attacker can use this method to read the user's Teams messages, send messages on their behalf, create groups, add or remove users from a group, and change group permissions.
The entire attack can be automated, allowing malicious actors to spread through an organization like a worm by using compromised accounts to send the malicious GIF to other Teams users.
The cybersecurity firm told SecurityWeek that it believes the attack still works if someone is able to find Teams subdomains that can be hijacked.
In order to launch an attack such as the one described by CyberArk, the attacker also somehow needs to find a way to obtain access to a Teams account from which they can start sending malicious links or GIFs in order to spread within an organization.
If an attacker can convince the target to invite them to a job interview on Teams.
News URL
Related news
- Ransomware gangs pose as IT support in Microsoft Teams phishing attacks (source)
- Week in review: 48k Fortinet firewalls open to attack, attackers “vishing” orgs via Microsoft Teams (source)
- Microsoft Teams phishing attack alerts coming to everyone next month (source)
- Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation (source)
- Microsoft fixes under-attack privilege-escalation holes in Hyper-V (source)
- Ransomware attackers are “vishing” organizations via Microsoft Teams (source)
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891) (source)
- Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score (source)