Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit Microsoft Teams, Posing as IT Help Desk for Screen Sharing and Remote Access

Posted on August 29, 2025August 29, 2025 By CWS

A complicated phishing marketing campaign has been recognized, the place menace actors impersonate IT helpdesk personnel by way of Groups’ exterior communication options, exploiting the platform’s default configuration to bypass conventional electronic mail safety measures and acquire unauthorized screen-sharing and remote-control capabilities.

The assaults leverage Groups’ exterior collaboration options, that are enabled by default in Microsoft 365 tenants, permitting attackers to provoke contact with organizational customers with out prior authentication. 

Key Takeaways1. Default Groups settings allow direct IT helpdesk impersonation assaults, bypassing electronic mail safety.2. Voice calls keep away from safety warnings, resulting in display screen sharing and distant entry.3. Monitor ChatCreated/MessageSent logs for exterior .onmicrosoft.com domains.

This basic design alternative has created an unprecedented assault floor that mixes social engineering with reputable platform performance to devastating impact.

Voice Name Phishing and Distant Management 

In keeping with Axon Group reviews, Cybercriminals have developed a number of subtle assault vectors inside the Microsoft Groups ecosystem, every exploiting completely different points of the platform’s communication capabilities. 

The first assault technique entails one-on-one chat phishing, the place attackers use compromised Groups accounts or create malicious Entra ID tenants with .onmicrosoft.com domains – Microsoft’s default fallback domains for enterprise accounts with out customized area configurations.

The technical implementation begins with menace actors conducting reconnaissance by way of Groups’ person search performance, which permits exterior customers to confirm goal electronic mail addresses and ensure message supply capabilities. 

When profitable, attackers can provoke direct communication, although Microsoft has applied safety warnings, together with “exterior communication warning” pop-ups and “potential phishing warning messages” that seem primarily based on algorithmic menace detection.

Nevertheless, attackers have found strategies to bypass these safety measures by way of voice name phishing (vishing). 

Pretend IT Helpdesk calling sufferer inside Microsoft Groups

In contrast to text-based communications, voice calls from exterior Groups customers generate no warning pop-ups, making a seamless assault vector. 

As soon as belief is established by way of voice communication, attackers request display screen sharing permissions, enabling them to watch sufferer actions and doubtlessly information them by way of malicious actions.

Content material sharing configuration on Microsoft Groups

Probably the most regarding improvement entails distant management capabilities. Whereas Microsoft has applied safety controls that disable the “Give Management” and “Request Management” choices by default for exterior contributors, organizations which have modified these settings face important publicity, in keeping with the Axon Group. 

Attackers can doubtlessly acquire full distant entry to sufferer workstations by way of Groups’ built-in distant management options, eliminating the necessity for conventional Distant Monitoring and Administration (RMM) instruments like QuickAssist or AnyDesk.

Detection Methodologies

Safety groups can establish these assaults by way of particular Microsoft 365 audit log entries that function digital forensic artifacts. 

The first indicators embody ChatCreated occasions that set up new “OneOnOne” chats between attackers and victims, containing essential metadata together with Chat Thread IDs, sender show names, electronic mail addresses, and Group IDs for each events.

MessageSent logs complement ChatCreated entries by offering sender IP addresses and embedded URL info, although message content material itself is just not logged. 

Further forensic indicators embody UserAccepted occasions when victims click on “Settle for” buttons in exterior sender pop-ups, and TeamsImpersonationDetected occasions triggered by Microsoft’s model impersonation detection algorithms.

Superior menace searching requires monitoring for particular M365 audit log patterns, together with ChatCreated operations with participant_info:has_foreign_tenant_users = true and communication_type = “OneOnOne” parameters. 

As menace actors proceed refining these strategies, organizations should implement complete monitoring of Groups audit logs, person education schemes centered on IT helpdesk impersonation ways, and restrictive exterior communication insurance policies to mitigate this evolving menace panorama.

Discover this Story Attention-grabbing! Comply with us on LinkedIn and X to Get Extra On the spot Updates.

Cyber Security News Tags:Access, Desk, Exploit, Hackers, Microsoft, Posing, Remote, Screen, Sharing, Teams

Post navigation

Previous Post: TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies
Next Post: Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations

Related Posts

Researchers Details Masking Malicious Scripts and Bypass Defense Mechanisms Cyber Security News
New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique Cyber Security News
Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Cyber Security News
CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday Cyber Security News
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection Cyber Security News
Critical Apple 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
  • Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support
  • Hackers Reportedly Demand Google Fire Two Employees, Threaten Data Leak
  • Microsoft Urges OEM Manufacturers to Fix Windows 11 USB-C Notification Issues
  • Microsoft To Mandate MFA for Accounts Signing In to the Azure Portal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
  • Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support
  • Hackers Reportedly Demand Google Fire Two Employees, Threaten Data Leak
  • Microsoft Urges OEM Manufacturers to Fix Windows 11 USB-C Notification Issues
  • Microsoft To Mandate MFA for Accounts Signing In to the Azure Portal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News