Thursday, December 5, 2024
HomeCVE/vulnerabilityHackers Hijack Microsoft Teams Accounts Using a Single Weaponized GIF Image

Hackers Hijack Microsoft Teams Accounts Using a Single Weaponized GIF Image

Published on

SIEM as a Service

Microsoft has patched a subdomain takeover vulnerability in Microsoft Teams that affects every user who uses the Teams desktop or web browser version.

Microsoft Teams is a leading communication and collaboration platform that combines workplace features such as chat, video meetings, file storage, collaboration on files, and integration with applications.

Microsoft Teams Vulnerability

Researchers from CyberArk discovered a worm-like vulnerability that lets hackers use a malicious GIF file to scrape user data and to take over the entire roster of Teams accounts.

- Advertisement - SIEM as a Service

The vulnerability resides in how the application programming interfaces (APIs) used to validate the communication between the client and the server.

With Teams access token (auth token) and the skype token is used to make API calls that let users send messages, read messages, create groups, add new users or remove users from groups, change permissions in groups, etc.

Microsoft Teams

According to CyberArk, the following subdomains are vulnerable to takeover;

  • aadsync-test.teams.microsoft.com
  • data-dev.teams.microsoft.com

An attacker can force the user to visit one of the sub-domains and get access to the auth token, by having the auth token attackers can steal the victim’s Teams account data.

“We considered this approach as well, sending an image to our victim with an “src” attribute set to the compromised sub-domain via Teams chat. When the victim opens this message, the victim’s browser will try to load the image and this will send the auth token cookie to the compromised sub-domain, “reads Cyberark blog post.

Victims will not have any indication of they’ve been attacked as the take over process is stealthy and dangerous.

Researchers published a video POC exploit of the vulnerability, they also warned that the vulnerability is wormable.

The vulnerability has been reported by Microsoft Security Research Center and Microsoft fixed the vulnerability by deleting the misconfigured DNS records of the two subdomains.

A Couple of days before a new Zoom flaw lets hackers record Zoom meeting sessions and to capture the chat text without the knowledge of meeting participants’ even though host disables recording option for the participants.

Due to this COVID-19 pandemic situation, many companies moved to full-time remote work, vulnerabilities like this may pose a huge risk.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification

A critical vulnerability has been identified in the bootloader of Cisco NX-OS Software, potentially...

Deloitte UK Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data

Brain Cipher has claimed to have breached Deloitte UK and exfiltrated over 1 terabyte...

Cloudflare Developer Domains Abused For Cyber Attacks

Cloudflare Pages, a popular web deployment platform, is exploited by threat actors to host...

Hackers Exploit Docker Remote API Servers To Inject Gafgyt Malware

Attackers are exploiting publicly exposed Docker Remote API servers to deploy Gafgyt malware by...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Google Chrome Security Update, Patch for High-severity Vulnerability

Google has released a significant security update for its Chrome browser, aiming to address...

MobSF XSS Vulnerability Let Attackers Inject Malicious Scripts

A critical vulnerability has been identified in the Mobile Security Framework (MobSF) that allows...

Salesforce Applications Vulnerability Could Allow Full Account Takeover

A critical vulnerability has been discovered in Salesforce applications that could potentially allow a...