Friday, February 21, 2025
HomeCyber Security NewsHackers Exploit Microsoft Teams Invites to Gain Unauthorized Access

Hackers Exploit Microsoft Teams Invites to Gain Unauthorized Access

Published on

SIEM as a Service

Follow Us on Google News

The Microsoft Threat Intelligence Center (MSTIC) has uncovered an ongoing and sophisticated phishing campaign leveraging Microsoft Teams invites to gain unauthorized access to user accounts and sensitive data.

The campaign, attributed to a threat actor known as Storm-2372, has been active since August 2024 and has targeted a wide range of industries, including government, defense, healthcare, technology, and energy in Europe, North America, Africa, and the Middle East.

Storm-2372’s method involves device code phishing, a technique wherein the threat actor uses fake meeting invitations to trick users into providing authentication tokens.

Device code phishing attack cycle
Device code phishing attack cycle

Upon receiving an invite, unsuspecting users are redirected to a legitimate authentication page and prompted to enter a device code generated by the attacker.

The stolen tokens allow the attacker to access the victim’s accounts without requiring a password, granting access to sensitive emails, cloud storage, and other services.

Sample messages from the threat actor posing as a prominent person and building rapport on Signal
Sample messages from the threat actor posing as a prominent person and building rapport on Signal

Once the initial breach occurs, Storm-2372 is observed moving laterally within compromised networks by sending further phishing emails from victim accounts.

The attacker has also exploited Microsoft’s Graph API to search for sensitive information, exfiltrating data using keywords such as “password,” “admin,” and “credentials.”

egitimate device code authentication page
Legitimate device code authentication page

Recent updates to the group’s tactics include the use of the Microsoft Authentication Broker client ID to register actor-controlled devices, enabling persistent access and further escalation.

Microsoft has linked Storm-2372 to Russian state interests due to its targeting patterns and tradecraft.

The campaign shows the actor leveraging popular third-party messaging apps, including WhatsApp and Signal, to pose as notable individuals and build trust with targets before delivering phishing invites.

To mitigate risks, Microsoft advises organizations to implement strict security measures, such as restricting device enrollment permissions, monitoring anomalous token activity, and reinforcing employee awareness about phishing techniques.

Microsoft is also actively notifying affected customers to secure their environments.

This incident underscores the evolving sophistication of phishing campaigns and the critical need for businesses to harden their defenses against such exploits.

With attacks such as these, vigilance and proactive security measures remain paramount in safeguarding sensitive data and infrastructure.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...