Saturday, April 12, 2025
HomeCyber Security NewsHackers Exploit Microsoft Teams Invites to Gain Unauthorized Access

Hackers Exploit Microsoft Teams Invites to Gain Unauthorized Access

Published on

SIEM as a Service

Follow Us on Google News

The Microsoft Threat Intelligence Center (MSTIC) has uncovered an ongoing and sophisticated phishing campaign leveraging Microsoft Teams invites to gain unauthorized access to user accounts and sensitive data.

The campaign, attributed to a threat actor known as Storm-2372, has been active since August 2024 and has targeted a wide range of industries, including government, defense, healthcare, technology, and energy in Europe, North America, Africa, and the Middle East.

Storm-2372’s method involves device code phishing, a technique wherein the threat actor uses fake meeting invitations to trick users into providing authentication tokens.

- Advertisement - Google News
Device code phishing attack cycle
Device code phishing attack cycle

Upon receiving an invite, unsuspecting users are redirected to a legitimate authentication page and prompted to enter a device code generated by the attacker.

The stolen tokens allow the attacker to access the victim’s accounts without requiring a password, granting access to sensitive emails, cloud storage, and other services.

Sample messages from the threat actor posing as a prominent person and building rapport on Signal
Sample messages from the threat actor posing as a prominent person and building rapport on Signal

Once the initial breach occurs, Storm-2372 is observed moving laterally within compromised networks by sending further phishing emails from victim accounts.

The attacker has also exploited Microsoft’s Graph API to search for sensitive information, exfiltrating data using keywords such as “password,” “admin,” and “credentials.”

egitimate device code authentication page
Legitimate device code authentication page

Recent updates to the group’s tactics include the use of the Microsoft Authentication Broker client ID to register actor-controlled devices, enabling persistent access and further escalation.

Microsoft has linked Storm-2372 to Russian state interests due to its targeting patterns and tradecraft.

The campaign shows the actor leveraging popular third-party messaging apps, including WhatsApp and Signal, to pose as notable individuals and build trust with targets before delivering phishing invites.

To mitigate risks, Microsoft advises organizations to implement strict security measures, such as restricting device enrollment permissions, monitoring anomalous token activity, and reinforcing employee awareness about phishing techniques.

Microsoft is also actively notifying affected customers to secure their environments.

This incident underscores the evolving sophistication of phishing campaigns and the critical need for businesses to harden their defenses against such exploits.

With attacks such as these, vigilance and proactive security measures remain paramount in safeguarding sensitive data and infrastructure.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...