Sunday, January 26, 2025
HomeCVE/vulnerabilityHackers Hijack Microsoft Teams Accounts Using a Single Weaponized GIF Image

Hackers Hijack Microsoft Teams Accounts Using a Single Weaponized GIF Image

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has patched a subdomain takeover vulnerability in Microsoft Teams that affects every user who uses the Teams desktop or web browser version.

Microsoft Teams is a leading communication and collaboration platform that combines workplace features such as chat, video meetings, file storage, collaboration on files, and integration with applications.

Microsoft Teams Vulnerability

Researchers from CyberArk discovered a worm-like vulnerability that lets hackers use a malicious GIF file to scrape user data and to take over the entire roster of Teams accounts.

The vulnerability resides in how the application programming interfaces (APIs) used to validate the communication between the client and the server.

With Teams access token (auth token) and the skype token is used to make API calls that let users send messages, read messages, create groups, add new users or remove users from groups, change permissions in groups, etc.

Microsoft Teams

According to CyberArk, the following subdomains are vulnerable to takeover;

  • aadsync-test.teams.microsoft.com
  • data-dev.teams.microsoft.com

An attacker can force the user to visit one of the sub-domains and get access to the auth token, by having the auth token attackers can steal the victim’s Teams account data.

“We considered this approach as well, sending an image to our victim with an “src” attribute set to the compromised sub-domain via Teams chat. When the victim opens this message, the victim’s browser will try to load the image and this will send the auth token cookie to the compromised sub-domain, “reads Cyberark blog post.

Victims will not have any indication of they’ve been attacked as the take over process is stealthy and dangerous.

Researchers published a video POC exploit of the vulnerability, they also warned that the vulnerability is wormable.

The vulnerability has been reported by Microsoft Security Research Center and Microsoft fixed the vulnerability by deleting the misconfigured DNS records of the two subdomains.

A Couple of days before a new Zoom flaw lets hackers record Zoom meeting sessions and to capture the chat text without the knowledge of meeting participants’ even though host disables recording option for the participants.

Due to this COVID-19 pandemic situation, many companies moved to full-time remote work, vulnerabilities like this may pose a huge risk.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

INE Security Alert: Expediting CMMC 2.0 Compliance

INE Security, a leading global provider of cybersecurity training and certifications, today announced a...

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

370+ Ivanti Connect Secure Exploited Using 0-Day Vulnerability

A major cybersecurity incident has come to light, with more than 370 Ivanti Connect...

Zero-Click Outlook RCE Vulnerability (CVE-2025-21298), PoC Released

Microsoft issued a critical patch to address CVE-2025-21298, a zero-click Remote Code Execution (RCE)...