Microsoft Teams is not the safe haven you think it is

Microsoft Teams
(Image credit: Shutterstock / monticello)

Cybercriminals are capitalizing on the popularity of collaboration platform Microsoft Teams to infect victims with malware, a new report suggests.

According to security firm Avanan, there has been a spike in the number of cyberattacks taking place over Microsoft Teams since the turn of the year.

Specifically, attackers are using Teams chats and channels to spread malicious executable (.exe) files throughout organizations.

In the report, Avanan is critical of the protections afforded by Microsoft Teams, which is described as “lacking” in its approach to scanning for malicious files and links. TechRadar Pro has asked Microsoft for a response to this critique.

Microsoft Teams attacks

Given services like Slack and Microsoft Teams are closed ecosystems, designed to be accessible only to members of a specific organization and a select pool of guests, users can be forgiven for assuming these digital spaces are safe from attackers.

However, Avanan’s research demonstrates that cybercriminals are more than capable of invading these private systems. And once inside, the potential to cause widespread damage is large.

As the report explains, attackers begin by gaining access to a company’s Microsoft Teams domain, either using credentials already exposed online or by stealing passwords via phishing attacks.

After breaking into a Teams domain, they are then free to deliver malicious files to any member of the organization, either via one-on-one chats or group channels.

In the specific instance highlighted by Avanan, the attackers distribute an executable file entitled “User Centric”, which the researchers suppose it designed to sound innocuous. Once opened, the executable establishes the ability to self-administer, effectively handing control of the machine to the attackers.

To defend against these kinds of threats, Avanan advises Microsoft Teams customers to implement a system whereby all files are downloaded in a sandbox environment, where they can be inspected for malicious content. 

Beyond that, businesses are advised to deploy a comprehensive security suite and deliver cybersecurity training that will equip employees with the skills to identify suspicious files delivered over Microsoft Teams. 

Update: February 18
A Microsoft spokesperson has since responded to our request for comment with the following statement:

"This marketing report describes a known technique where a user’s email account must already be compromised. We offer a default layer of protection that includes malware scanning for shared files and we encourage all customers to investigate and implement additional layers of protection and apply best practices depending on their unique needs."

"We're continually evaluating the effectiveness of our platform at combating this kind of abuse, and investing to provide better protection where threat actors find weaknesses."

Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Read more
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Magnifying glass enlarging the word 'malware' in computer machine code
Microsoft Teams and AnyDesk abused to deploy dangerous malware, so be on your guard
Phishing
Russian cyberattackers spotted hitting Microsoft Teams with new phishing campaign
Shutterstock.com / kanlaya wanon
Microsoft Teams abused in Russian email bombing ransomware campaign
Microsoft Teams
Microsoft Teams is finally introducing a spam and phishing alert - here’s what you need to know
Hacker Typing
This devious two-step phishing campaign uses Microsoft tools to bypass email security
Latest in Security
Google Chrome dark mode
Google updates Chrome extension rules to ban affiliate link injection without user action or benefit
Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard
This worrying botnet targets unsecure TP-Link routers - thousands of devices already hacked
Avast cybersecurity
UK cybersecurity sector could be worth £13bn, research shows
An option to add Ambient Music buttons to the iOS 18.4 Control Center.
Apple fixes dangerous zero-day used in attacks against iPhones and iPads
Trump
Hackers are abusing $TRUMP tokens to lure victims in to new phishing scam
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
Latest in News
GTA 5
GTA Online publisher Take-Two is gunning for a black market that’s basically heaven for cheaters
The Discovery+ homepage
Discovery+ just got a big update to its streaming app that makes it more like Max – here are 5 great new features to try
Two Android phones on a green and blue background showing Google Messages
Struggling with slow Google Messages photo transfers? Google says new update will make 'noticeable difference'
Google Meet create custom backgrounds
More AI features are coming to Google Workspace
Elayne, Egwene, and Nynaeve dressed regally and on horseback in The Wheel of Time season 3
'There's a reason why we do it': The Wheel of Time showrunner responds to fans who are still upset over the Prime Video show's plot alterations
A mockup of the possible Apple M3 Ultra logo
Performance isn't the only reason you should buy Apple's M3 Ultra Mac Studio - it's reportedly one of the most power-efficient processors too