Cyber Security News

ConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams

A stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers can exploit Microsoft Teams to execute system commands on compromised hosts remotely.

This innovative project, designed with Red Team operations in mind, uses Teams messages for hidden data exfiltration and command execution, demonstrating a significant security challenge for organizations relying on the Microsoft collaboration tool.

How ConvoC2 Works

ConvoC2 leverages Microsoft Teams as a medium to infiltrate and exfiltrate data covertly. Exploiting hidden tags in Teams messages injects commands for execution on compromised systems.

To exfiltrate data, outputs are hidden within Adaptive Cards’ image URLs, triggering outbound HTTP requests to a C2 server controlled by attackers.

The unique methodology minimizes detection:

  • No direct connection exists between the victim and attacker, as traffic flows through Microsoft’s servers.
  • Antivirus and monitoring tools rarely inspect Teams logs, making this technique stealthier.
  • Even if a user does not accept the attacker’s chat request, the commands are still cached in Teams logs and can be executed.

Architecture and Demonstration

A demonstration video highlights ConvoC2 in action. In the test, two compromised hosts one running the new Teams on Windows 11 and another operating the old Teams on Windows 10—are controlled via the ConvoC2 server.

In some scenarios, the attacker is external to the victim’s organization, emphasizing its cross-org exploitation potential.

Are you From SOC/DFIR Teams? Analyze Malware and Phishing with ANY.RUN’s Interactive Sandbox – Try for Free

Setting Up ConvoC2

Interested in testing this tool? Here’s what ConvoC2 requires:

Install the ConvoC2 Server and Agent:

Set Up a Teams Channel with Incoming Webhooks:

Create a Teams channel and configure a Workflow Incoming Webhook. This acts as the medium for receiving adaptive cards containing extracted data.

Fetch Victim IDs and Auth Tokens:

Using a web proxy, intercept Teams API requests to obtain the victim’s unique IDs and Bearer token. This allows the server to authenticate and send commands.

Run and Operate the Server:

Using public-facing HTTP traffic on port 80, the server manages connected agents and executes commands on victim systems.

Requirements for Execution

  • Microsoft Teams must be running on the victim’s system (even in the background).
  • A configurable C2 server with HTTP traffic enabled.
  • Basic setup knowledge to configure webhooks and capture IDs/authentication tokens.

For a detailed setup walkthrough, refer to the project’s repository instructions.

ConvoC2 draws inspiration from the earlier research, GIFShell, conducted by Bobbyrsec, which identified vulnerabilities in embedding commands within Base64-encoded GIFs posted in Teams chats.

Though Microsoft has partially addressed those issues, ConvoC2 pioneers an alternative that embeds commands directly in hidden <span> tags within messages, bypassing prior security measures.

Example: Commands are hidden in the aria-label attribute of <span> tags with style="display:none". Microsoft Teams logs these, enabling command execution stealthily.

The developer has outlined several enhancements to improve ConvoC2’s capabilities:

  • Integrating AES encryption for message security.
  • Implementing a keepalive mechanism to detect if an agent is inactive.
  • Adding a PowerShell version of the agent for broader compatibility.

The Developer Invites

ConvoC2 serves as a vital reminder of the evolving landscape of cyber threats. By exploiting a trusted collaboration platform like Microsoft Teams, attackers can achieve unprecedented stealth when carrying out malicious operations. Organizations are urged to:

  • Enhance monitoring of Microsoft Teams environments.
  • Regularly audit server and log activity for unusual patterns.
  • Implement defensive measures such as endpoint detection and response (EDR) tools capable of inspecting Teams logs.

The developer invites the cybersecurity community to contribute improvements to the project or identify potential bugs. Researchers and engineers can submit pull requests via the ConvoC2 GitHub repository.

Collaboration with the community remains a cornerstone for identifying vulnerabilities and strengthening defenses. Stay vigilant, and ensure your organization is prepared for emerging threats like ConvoC2.

2024 MITRE ATT&CK Evaluation Results: ONLY Cynet Delivers 100% Detection & Protection – Download Free Guide

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path…

1 day ago

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept…

1 day ago

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has been…

1 day ago

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By…

1 day ago

Juniper Networks Vulnerability Let Remote Attacker Execute Network Attacks

Juniper Networks has disclosed a significant vulnerability affecting its Junos OS and Junos OS Evolved…

1 day ago

Beware! Fake Crowdstrike Recruitment Emails Spread Cryptominer Malware

CrowdStrike, a leader in cybersecurity, uncovered a sophisticated phishing campaign that leverages its recruitment branding…

1 day ago