A stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers can exploit Microsoft Teams to execute system commands on compromised hosts remotely.
This innovative project, designed with Red Team operations in mind, uses Teams messages for hidden data exfiltration and command execution, demonstrating a significant security challenge for organizations relying on the Microsoft collaboration tool.
ConvoC2 leverages Microsoft Teams as a medium to infiltrate and exfiltrate data covertly. Exploiting hidden tags in Teams messages injects commands for execution on compromised systems.
The unique methodology minimizes detection:
A demonstration video highlights ConvoC2 in action. In the test, two compromised hosts one running the new Teams on Windows 11 and another operating the old Teams on Windows 10—are controlled via the ConvoC2 server.
In some scenarios, the attacker is external to the victim’s organization, emphasizing its cross-org exploitation potential.
Are you From SOC/DFIR Teams? Analyze Malware and Phishing with ANY.RUN’s Interactive Sandbox – Try for Free
Interested in testing this tool? Here’s what ConvoC2 requires:
Install the ConvoC2 Server and Agent:
Set Up a Teams Channel with Incoming Webhooks:
Create a Teams channel and configure a Workflow Incoming Webhook. This acts as the medium to receive Adaptive Cards containing extracted data.
Fetch Victim IDs and Auth Tokens:
Using a web proxy, intercept Teams API requests to obtain the victim’s unique IDs and Bearer token. This allows the server to authenticate and send commands.
Run and Operate the Server:
Using public-facing HTTP traffic on port 80, the server manages connected agents and executes commands on victim systems.
For a detailed setup walkthrough, refer to the project’s repository instructions.
ConvoC2 draws inspiration from the earlier research, GIFShell, conducted by Bobbyrsec, which identified vulnerabilities in embedding commands within Base64-encoded GIFs posted in Teams chats.
Though Microsoft has partially addressed those issues, ConvoC2 pioneers an alternative that embeds commands directly in hidden <span>
tags within messages, bypassing prior security measures.
Example: Commands are hidden in the aria-label
attribute of <span>
tags with style="display:none"
. Microsoft Teams logs these, enabling command execution stealthily.
The developer has outlined several enhancements to improve ConvoC2’s capabilities:
ConvoC2 serves as a vital reminder of the evolving landscape of cyber threats. By exploiting a trusted collaboration platform like Microsoft Teams, attackers can achieve unprecedented stealth when carrying out malicious operations. Organizations are urged to:
The developer invites the cybersecurity community to contribute improvements to the project or identify potential bugs. Researchers and engineers can submit pull requests via the ConvoC2 GitHub repository.
Collaboration with the community remains a cornerstone for identifying vulnerabilities and strengthening defenses. Stay vigilant, and ensure your organization is prepared for emerging threats like ConvoC2.
2024 MITRE ATT&CK Evaluation Results: ONLY Cynet Delivers 100% Detection & Protection – Download Free Guide
Researchers discovered a new variant of the AntiDot banking trojan targeting Android mobile devices through…
Researchers identified FUNNULL, a Chinese CDN, as hosting malicious content, which includes fake trading apps…
Cybercriminals exploited typosquatting to deploy a malicious npm package, `@typescript_eslinter/eslint`, targeting developers seeking the legitimate…
Wuhan Chinasoft Token Information Technology Co., Ltd. developed EagleMsgSpy, a surveillance tool operational since 2017,…
Cybersecurity researchers have uncovered a sophisticated exploitation campaign involving a zero-day (0-day) vulnerability in Cleo…
GitLab announced the release of critical security patches for its Community Edition (CE) and Enterprise…