Cyber Security News

ConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams

A stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers can exploit Microsoft Teams to execute system commands on compromised hosts remotely.

This innovative project, designed with Red Team operations in mind, uses Teams messages for hidden data exfiltration and command execution, demonstrating a significant security challenge for organizations relying on the Microsoft collaboration tool.

How ConvoC2 Works

ConvoC2 leverages Microsoft Teams as a medium to infiltrate and exfiltrate data covertly. Exploiting hidden tags in Teams messages injects commands for execution on compromised systems.

To exfiltrate data, outputs are hidden within Adaptive Cards’ image URLs, triggering outbound HTTP requests to a C2 server controlled by attackers.

The unique methodology minimizes detection:

  • No direct connection exists between the victim and attacker, as traffic flows through Microsoft’s servers.
  • Antivirus and monitoring tools rarely inspect Teams logs, making this technique stealthier.
  • Even if a user does not accept the attacker’s chat request, the commands are still cached in Teams logs and can be executed.

Architecture and Demonstration

A demonstration video highlights ConvoC2 in action. In the test, two compromised hosts one running the new Teams on Windows 11 and another operating the old Teams on Windows 10—are controlled via the ConvoC2 server.

In some scenarios, the attacker is external to the victim’s organization, emphasizing its cross-org exploitation potential.

Are you From SOC/DFIR Teams? Analyze Malware and Phishing with ANY.RUN’s Interactive Sandbox – Try for Free

Setting Up ConvoC2

Interested in testing this tool? Here’s what ConvoC2 requires:

Install the ConvoC2 Server and Agent:

Set Up a Teams Channel with Incoming Webhooks:

Create a Teams channel and configure a Workflow Incoming Webhook. This acts as the medium for receiving adaptive cards containing extracted data.

Fetch Victim IDs and Auth Tokens:

Using a web proxy, intercept Teams API requests to obtain the victim’s unique IDs and Bearer token. This allows the server to authenticate and send commands.

Run and Operate the Server:

Using public-facing HTTP traffic on port 80, the server manages connected agents and executes commands on victim systems.

Requirements for Execution

  • Microsoft Teams must be running on the victim’s system (even in the background).
  • A configurable C2 server with HTTP traffic enabled.
  • Basic setup knowledge to configure webhooks and capture IDs/authentication tokens.

For a detailed setup walkthrough, refer to the project’s repository instructions.

ConvoC2 draws inspiration from the earlier research, GIFShell, conducted by Bobbyrsec, which identified vulnerabilities in embedding commands within Base64-encoded GIFs posted in Teams chats.

Though Microsoft has partially addressed those issues, ConvoC2 pioneers an alternative that embeds commands directly in hidden <span> tags within messages, bypassing prior security measures.

Example: Commands are hidden in the aria-label attribute of <span> tags with style="display:none". Microsoft Teams logs these, enabling command execution stealthily.

The developer has outlined several enhancements to improve ConvoC2’s capabilities:

  • Integrating AES encryption for message security.
  • Implementing a keepalive mechanism to detect if an agent is inactive.
  • Adding a PowerShell version of the agent for broader compatibility.

The Developer Invites

ConvoC2 serves as a vital reminder of the evolving landscape of cyber threats. By exploiting a trusted collaboration platform like Microsoft Teams, attackers can achieve unprecedented stealth when carrying out malicious operations. Organizations are urged to:

  • Enhance monitoring of Microsoft Teams environments.
  • Regularly audit server and log activity for unusual patterns.
  • Implement defensive measures such as endpoint detection and response (EDR) tools capable of inspecting Teams logs.

The developer invites the cybersecurity community to contribute improvements to the project or identify potential bugs. Researchers and engineers can submit pull requests via the ConvoC2 GitHub repository.

Collaboration with the community remains a cornerstone for identifying vulnerabilities and strengthening defenses. Stay vigilant, and ensure your organization is prepared for emerging threats like ConvoC2.

2024 MITRE ATT&CK Evaluation Results: ONLY Cynet Delivers 100% Detection & Protection – Download Free Guide

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks

As California grapples with devastating wildfires, communities are rallying to protect lives and property. Unfortunately,…

14 hours ago

AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks

AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August 2024…

14 hours ago

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet's inception.…

14 hours ago

FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches

The Federal Trade Commission (FTC) has announced that it will require GoDaddy Inc. to develop…

14 hours ago

Thousands of PHP-based Web Applications Exploited to Deploy Malware

A significant cybersecurity threat has emerged, threatening the integrity of thousands of PHP-based web applications.…

15 hours ago

W3 Total Cache Plugin Vulnerability Let Attackers Gain Unauthorized Access to Sensitive Data

A significant security vulnerability has been identified in the W3 Total Cache plugin for WordPress,…

18 hours ago