Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks

Posted on November 7, 2025November 7, 2025 By CWS

Microsoft’s upcoming Groups replace, set for focused releases in early November 2025 and worldwide by January 2026, will enable customers to provoke chats with solely an e-mail tackle, even when the recipient isn’t a Groups consumer. This function raises safety issues amongst consultants.

The invitee joins as a visitor through e-mail, enabling seamless exterior communication throughout Android, desktop, iOS, Linux, and Mac. Whereas aimed toward versatile work, this default-enabled function widens the door for phishing scams and malware infiltration, doubtlessly leaking delicate knowledge within the course of.

The core difficulty lies within the function’s broad accessibility. By permitting chats with exterior e-mail addresses with out prior validation, Groups creates an enlarged assault vector.

Phishing actors might spoof reliable invitations, tricking customers into clicking malicious hyperlinks or sharing credentials. As an illustration, a faux “chat request” from a supposed enterprise associate would possibly embed malware payloads, exploiting the visitor be part of course of to ship ransomware or adware instantly into organizational chats.

Safety researchers warn that this mirrors ways seen in OAuth phishing campaigns, the place attackers impersonate trusted providers to reap knowledge.

With chats ruled by Entra B2B Visitor insurance policies however nonetheless confined to the group’s boundary, the chance of inadvertent knowledge publicity grows.

Microsoft Groups’ New “Chat with Anybody” Function

Workers would possibly unknowingly disclose proprietary data to impostors, resulting in mental property theft or compliance violations below rules reminiscent of GDPR.

In follow, this might amplify threats in hybrid work environments. Contemplate a gross sales crew chatting with a “potential shopper” through e-mail invite; if the contact is compromised, attackers acquire a foothold to eavesdrop or escalate privileges.

Malware distribution turns into less complicated, too, as visitors might inadvertently ahead contaminated recordsdata, bypassing conventional e-mail filters, since interactions happen inside Groups’ ecosystem.

Microsoft acknowledges the change impacts all customers and urges organizations to replace documentation and prepare help groups. Nevertheless, the default activation means many companies might overlook it till incidents happen, echoing previous oversights just like the SolarWinds breach, the place unpatched options fueled widespread compromise.

Admins aren’t powerless. To disable the function, they will use PowerShell to set the UseB2BInvitesToAddExternalUsers attribute in TeamsMessagingPolicy to false, successfully blocking exterior email-based chats.

This easy tweak restores tighter controls, limiting invitations to verified B2B connections. Specialists suggest combining it with multi-factor authentication enforcement, common coverage audits, and consumer consciousness coaching to counter phishing makes an attempt.

As Groups evolves, balancing innovation with safety stays essential. This rollout underscores the necessity for proactive protection in collaborative instruments, lest comfort develop into a cybercriminal’s gateway.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacks, Chat, Exposes, Feature, Malware, Microsoft, Phishing, Teams, Users

Post navigation

Previous Post: Data Exposure Vulnerability Found in Deep Learning Tool Keras
Next Post: New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

Related Posts

APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task Cyber Security News
Critical GitHub Copilot Vulnerability Let Attackers Exfiltrate Source Code From Private Repos Cyber Security News
DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs Cyber Security News
Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce Cyber Security News
The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses Cyber Security News
Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware
  • German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure
  • ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process
  • Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
  • Herodotus Android Banking Malware Takes Full Control Of Device Evading Antivirus

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware
  • German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure
  • ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process
  • Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
  • Herodotus Android Banking Malware Takes Full Control Of Device Evading Antivirus

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News