Cybercriminals have devised a terrifyingly successful method of infecting millions of people all at the same time. New sorts of assaults have been discovered, in which hackers have begun dumping malicious executable files into Microsoft Teams chats, which may then be executed by the victim. Anyone who participates in the conversation and then opens this file will have their PC infected with malicious software.
Microsoft Teams Malware: Malicious activities can trick you
It is simple to understand how the assaults may be used to send malware to a big number of people at the same time. Individuals and whole organisations use Microsoft Teams to communicate and collaborate on projects and crucial office assets such as documents and spreadsheets. Once this is done, hackers may insert a malicious file into the mix, which can very easily deceive anybody into downloading and executing them, especially given the natural faith that people have in an official group of individuals.
In January of this year, Avanan, a Check Point business that specialises in the security of collaboration platforms such as Microsoft Teams, discovered a series of assaults on Microsoft Teams conversations. Hackers have uploaded a harmful Trojan document to a Teams chat thread, according to a report published by the company, which has warned that it has encountered “thousands” of these assaults.
Also Read: What Is 256 Bit Encryption?
Stay aware of executable files
A .exe file with the name “User-Centric” is mentioned in the report as being the format of the document. This file contains a Trojan horse, which, when installed by individuals who have been duped by it, writes data to the Windows registry and causes the computer to crash. Installing DLL files on the hacked system and creating shortcut links to self-administering are subsequently performed. This is how Microsoft Teams malware might trick you out.
As a matter of fact, the attacks can only be launched if a hacker has gained access to a Teams conversation. According to Avanan, this may be accomplished quickly and easily in a variety of methods. In it, it is said that hackers can infiltrate an inter-organizational conversation in order to get access to a target organisation, or that hackers can compromise an email account in order to gain access to Teams. In other cases, earlier phishing attempts can give them with the Microsoft 365 credentials of a person, which they can then use to get into Teams or any other service within the Microsoft Office suite.
It also highlights one significant aspect from the assaults, which is that “default Teams safeguards are weak,” as the paper points out. It emphasises that the software does not perform a large number of checks for dangerous links and files that are shared through it, and as a result, hackers can easily use it to disseminate malicious stuff to others.
Because Teams is the go-to service for organisations and because it has such security flaws, it is quickly becoming a popular target for hackers looking to steal information. Avanan then recommends that organisations implement full-suite security, which is capable of protecting all lines of business communication, including Teams, as a precaution.