Thursday, April 10, 2025
HomeCyber Security NewsMicrosoft Unveils Phishing Attack Protection for Teams Chat

Microsoft Unveils Phishing Attack Protection for Teams Chat

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has taken a significant step toward enhancing cybersecurity by introducing a new phishing attack protection feature for Microsoft Teams.

The feature aims to safeguard users from brand impersonation in chats initiated by external domains, a common tactic used by cybercriminals to launch phishing attacks.

The new feature, which proactively alerts users to potential impersonation risks during first contact with external domains, will be rolled out in phases.

- Advertisement - Google News

It is scheduled to begin its targeted release in late October 2024, with global availability expected by mid-February 2025.

Targeting External Chat Risks

The growing popularity of Microsoft Teams as a business collaboration tool has also made it a target for cyber threat actors. Organizations that allow communication with external domains through Teams are particularly vulnerable to phishing attacks.

Cybercriminals often impersonate trusted brands to deceive employees, aiming to steal credentials, deploy malware, or carry out ransomware attacks.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

To counter these threats, Microsoft’s new security feature will scan incoming messages from external senders during their initial contact. If an attempt to impersonate a trusted brand or domain is detected, the system will flag it with a high-risk alert.

The warning will prompt users to closely inspect the sender’s name and email address before engaging further.

Microsoft plans to roll out the new feature in two phases:

  1. Targeted Release (Preview): Starting in late October 2024, the feature will be available for select users in the Targeted Release program, allowing organizations to test and provide feedback before the global launch.
  2. General Availability (Worldwide): The broader rollout will begin in mid-November 2024 and is expected to complete by mid-February 2025.

Although the initial completion date was set for mid-January 2025, Microsoft has slightly adjusted the timeline to ensure a smooth deployment of this important security enhancement.

How It Works

Currently, Teams users can receive messages from external domains if allowed by their organization. These messages, while subject to user acceptance, lack impersonation risk detection capabilities. The new feature introduces several safeguards:

  • Messages from external senders will automatically be checked for impersonation risks during the first interaction.
  • If a risk is detected, users will see a high-risk warning in the Accept/Block prompt.
  • Users must preview external messages before making a decision, ensuring they stay cautious.
  • Even after accepting a message, an additional warning will remind users to verify the sender’s authenticity.

The feature will be enabled by default and requires no action from IT administrators. However, organizations can monitor impersonation attempts via audit logs and are advised to educate employees on recognizing these alerts.

Microsoft’s new feature comes at a critical time, as phishing campaigns targeting Teams users have surged. Notably, threat groups like FIN7 and Storm-1811 have impersonated IT support personnel to deceive employees.

These actors exploit Teams’ default settings to initiate contact, often after overwhelming victims with “email bombing” tactics.

Once trust is established, attackers manipulate victims into granting remote access through tools like Microsoft Quick Assist or Teams’ screen-sharing feature.

This access is then exploited to install malware, harvest credentials, and move laterally within networks. Recent incidents also revealed ransomware operations, such as the deployment of Black Basta ransomware through these methods.

Between November 2024 and January 2025, researchers observed over 15 incidents of such attacks, with activity peaking in early 2025.

Microsoft’s integration of advanced phishing protection into Teams signals a proactive approach to combating modern cybersecurity threats.

By prioritizing user safety without disrupting workflows, the tech giant reaffirms its commitment to creating a secure collaboration environment.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks

Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been...

AkiraBot Floods 80,000 Sites After Outsmarting CAPTCHAs and Slipping Past Network Defenses

AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats...

Microsoft Identity Web Flaw Exposes Sensitive Client Secrets and Certificates

A new vulnerability has been discovered in the Microsoft.Identity.Web NuGet package under specific conditions,...

CatB Ransomware Abuses Microsoft Distributed Transaction Coordinator for Stealthy Payload Execution

The cybersecurity realm has encountered a formidable adversary with the emergence of CatB ransomware,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks

Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been...

AkiraBot Floods 80,000 Sites After Outsmarting CAPTCHAs and Slipping Past Network Defenses

AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats...

Microsoft Identity Web Flaw Exposes Sensitive Client Secrets and Certificates

A new vulnerability has been discovered in the Microsoft.Identity.Web NuGet package under specific conditions,...