Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Using Teams to Deliver Malicious Content Posing as Microsoft Services

Posted on January 27, 2026January 27, 2026 By CWS

A classy phishing marketing campaign has been recognized by which risk actors are abusing reputable Microsoft Groups performance to distribute malicious content material that seems to originate from trusted Microsoft companies.

By leveraging the platform’s “Invite a Visitor” function and crafting misleading group names, attackers are bypassing conventional electronic mail safety controls to ship fraudulent billing notifications on to victims’ inboxes.

The assault methodology depends on exploiting the belief customers place in automated notifications from collaboration platforms. Reasonably than spoofing electronic mail addresses or injecting malicious URLs, the attackers create new groups inside Microsoft Groups, assigning them names designed to imitate pressing monetary alerts. These names usually reference subscription renewals or auto-pay notices to induce panic.

A particular instance noticed within the wild contains group names resembling: “Subscription Auto-Pay Discover (Ivoice ID: 2025_614632PPOT_SAG Quantity 629. 98 USD). Should you didn’t authorize or full this m0nthly Fee,plese c0ntact our assist group urgently.”

As soon as the group is created, the attacker sends invites to exterior targets utilizing the native “Invite a Visitor” function. The recipient receives an electronic mail instantly from a reputable Microsoft deal with (e.g., noreply@electronic mail.groups.microsoft.com).

Pretend Microsoft Groups Invite (Supply: Checkpoint)

As a result of the e-mail infrastructure is real, it simply passes SPF, DKIM, and DMARC checks. Nevertheless, the physique of the e-mail shows the malicious group title containing the fraudulent billing message and a assist telephone quantity in a big, distinguished font.

This marketing campaign is distinct in its use of phone-based social engineering (vishing). As a substitute of directing customers to a credential-harvesting website, the textual content instructs victims to name a fraudulent assist line to resolve the alleged cost.

To evade automated content material filters, attackers make use of obfuscation strategies inside the group title, using character substitutions, blended Unicode characters, and visually comparable glyphs.

The dimensions of this operation is important, with telemetry indicating a broad, indiscriminate method reasonably than focused espionage. Safety researchers recorded a complete of 12,866 phishing messages distributed in the course of the marketing campaign’s peak, averaging 990 messages each day. These assaults reached roughly 6,135 distinct clients.

The distribution of targets suggests the attackers aimed to take advantage of widespread Microsoft Groups adoption. The manufacturing, engineering, and building sectors bore the brunt of the exercise, accounting for 27.4% of affected organizations.

This was adopted by the Know-how/SaaS/IT sector at 18.6% and the Schooling sector at 14.9%. Different affected verticals included skilled companies, authorities, and finance.

Geographic Distribution of Targets

The marketing campaign demonstrated a world attain, although the first focus remained on North American targets. Organizations in the USA comprised 67.9% of the sufferer pool. European entities accounted for 15.8%, adopted by Asia at 6.4%.

A particular regional breakdown of the Latin American (LATAM) impression exhibits a focus in Brazil and Mexico:

CountryPercentage of LATAM TargetsBrazil44percentMexico31percentArgentina11percentColombia8percentChile4percentPeru2%

This marketing campaign highlights a essential hole in collaboration safety: the reliance on content material inspection inside invites generated by trusted platforms. For the reason that electronic mail supply mechanism is reputable, organizations can’t rely solely on electronic mail authentication protocols to dam these threats.

Safety groups are suggested to coach customers on scrutinizing sudden Groups invites, notably these containing pressing monetary language, telephone numbers, or uncommon character formatting.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Content, Deliver, Hackers, Malicious, Microsoft, Posing, Services, Teams

Post navigation

Previous Post: Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors
Next Post: Canva, Atlassian, Epic Games Among the 100+ Enterprises Targeted by ShinyHunters Group

Related Posts

New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data Cyber Security News
Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace Cyber Security News
Real-Time Threat Monitoring Tool Using Sigma and YARA Rules Cyber Security News
SquareX Reveals AI Browsers Vulnerable to OAuth Attacks and Malware Threats Cyber Security News
South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims Cyber Security News
10 Best Anti-Phishing Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities
  • G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities
  • G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark