The US Navy has hacked Microsoft Teams to send malware
A new tool in response to a new Microsoft Teams discovery
Security experts at the US Navy have developed a tool to exploit a recently discovered flaw in Microsoft Teams.
Last month, the video conferencing software was found to have bug which allowed files sent from external accounts to be received into an organization's inbox, something that is supposed to be prohibited.
The red team at the US Navy has made a tool called TeamsPhisher that makes use of this flaw, which involves simply changing the ID in the POST request of a message to make Teams think that the external file send has actually come from an internal account, and is therefore accepted.
Protecting your business from the biggest threats online
Perimeter 81's Malware Protection intercepts threats at the delivery stage to prevent known malware, polymorphic attacks, zero-day exploits, and more. Let your people use the web freely without risking data and network security.
Preferred partner (What does this mean?)
TeamsPhisher
Written in Python, the tool can carry out attacks with full autonomy. All the user has to do is write the accompanying message, attach the file and give it a list of targets to hit. It will work out which targets have external message reception turned on and only attack those, as this has to be enabled for the attack to work.
Another trick it uses is to make the new thread with the user a group chat by including the target's email twice. According to the description on the tool's GitHub page, this will, "bypass the "Someone outside your organization messaged you, are you sure you want to view it" splash screen that can give our targets reason for pause."
The message is sent to the user and the attachment will be linked in the user's Sharepoint.
TeamsPhisher also requires the targets to have Microsoft Business accounts with a Teams and Sharepoint license, which many companies who use Teams will. The tool can also delay messages to prevent running up against rate limits, as well as write its outputs to a log file.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
A threat actor could use TeamsPhisher to deliver malware to Teams users who have external messaging turned on. Microsoft has not yet fixed the issue, and said that it isn't even serious enough to merit immediate attention from the company.
It also said that it is aware of the new TeamsPhisher tool and notes that it relies on social engineering to work, so is advising users merely to be cautious when receiving any links or attachments.
Users can disable external messages by navigating to the Microsoft Teams Admin Center and then to External Access. If users do not wish to block all external communications, then they can choose to communicate with trusted domains only by adding them to the allow list.
- Here is the best endpoint protection for your business
Lewis Maddison is a Reviews Writer for TechRadar. He previously worked as a Staff Writer for our business section, TechRadar Pro, where he had experience with productivity-enhancing hardware, ranging from keyboards to standing desks. His area of expertise lies in computer peripherals and audio hardware, having spent over a decade exploring the murky depths of both PC building and music production. He also revels in picking up on the finest details and niggles that ultimately make a big difference to the user experience.