Site icon WinCert

Microsoft Teams bug could allow malware deployment from external tenant accounts

<p>A potential vulnerability has been discovered in Microsoft Teams&comma; which could be exploited to deliver malware&period;  Security researchers at Jumpsec found a way to inject malware into an organization&&num;8217&semi;s network using the popular video conferencing and collaboration software Microsoft Teams&period; Malware can be injected even from a Teams account that belongs to an external user&period;<&sol;p>&NewLine;<p><img class&equals;"alignnone size-full wp-image-3604" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2020&sol;03&sol;teams-logo&period;png" alt&equals;"" width&equals;"441" height&equals;"242" &sol;><&sol;p>&NewLine;<p>By taking advantage of default app configurations&comma; this attack relies on the capability of an organization&&num;8217&semi;s Microsoft Teams client to accept communications from external tenants – in other words&comma; to Teams accounts outside of the organization&period; While the exploit could be used for social engineering and phishing attacks&comma; it can also be used to bypass Teams default and built-in protections against files from external tenant&&num;8217&semi;s users&comma; allowing the delivery of malware content&period;<&sol;p>&NewLine;<p>The security researchers uncovered a method to bypass these restrictions by modifying the recipient ID&comma; both internally and externally in the POST request of a message&period; By tricking Teams into detecting an external account as internal&comma; they successfully managed to deliver a command and control app to another organization&&num;8217&semi;s inbox&comma; executing a covert operation&period;<&sol;p>&NewLine;<p>What makes this vulnerability particularly concerning is that hackers don&&num;8217&semi;t have to use convincing phishing messages to deceive their victims&period; Once they register a domain similar to the target organization&&num;8217&semi;s&comma; employees might believe by mistake that a link originates from their company&comma; leading them to download the malicious content&period;<&sol;p>&NewLine;<p>Upon reporting the exploit to Microsoft&comma; the Redmond giant responded that it does not consider the vulnerability to be of instant concern&comma; indicating a relatively low-risk assessment&period; Microsoft still did not confirm when a patch will be released to address this issue&period;<&sol;p>&NewLine;<p>To mitigate this risk&comma; organizations have the option to disable communication with external tenants through the Microsoft Teams Admin Center&comma; specifically by adjusting the External Access settings&period; And while blocking all external communications for many organizations might not be desirable&comma; administrators can choose to only allow communication with trusted domains by adding them to an allowed list&period;<&sol;p>&NewLine;<p>The researchers have also submitted their findings to the Microsoft Teams <a href&equals;"https&colon;&sol;&sol;feedbackportal&period;microsoft&period;com&sol;feedback&sol;idea&sol;16fe3111-4410-ee11-a81c-000d3a7a48db" target&equals;"&lowbar;blank" rel&equals;"noopener">feedback portal<&sol;a>&comma; where users can vote on the post in order to prompt Microsoft to address this issue with greater urgency&period;<&sol;p>&NewLine;

Exit mobile version