Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Can Exploit Microsoft Teams Vulnerabilities to Manipulate Messages and Alter Notifications

Posted on November 4, 2025November 4, 2025 By CWS

Crucial vulnerabilities in Microsoft Groups, a platform central to office communication for over 320 million customers worldwide, allow attackers to impersonate executives and tamper with messages undetected.

These vulnerabilities, now patched by Microsoft, allowed each exterior company and insiders to spoof identities in chats, notifications, and calls, probably resulting in fraud, malware distribution, and misinformation.

Test Level disclosed the difficulty to Microsoft responsibly in March 2024. The problems spotlight how belief in collaboration instruments may be weaponized by refined risk actors concentrating on distant work infrastructure.

Launched in 2017 as a part of Microsoft 365, Groups integrates chat, video calls, file sharing, and apps, making it indispensable for companies from startups to Fortune 500 corporations.

Test Level’s investigation centered on the net model’s JSON-based structure, the place messages embrace parameters like content material, messagetype, clientmessageid, and imdisplayname.

Attackers exploited these to edit messages with out the “Edited” label by reusing clientmessageids, successfully rewriting historical past with out traces.

Notifications might be manipulated by altering imdisplayname, making alerts seem from high-level executives like CEOs, exploiting customers’ instinctive belief in pressing pings.

In personal chats, modifying dialog subjects through a PUT endpoint modified show names, deceptive contributors in regards to the sender’s identification, as proven in before-and-after screenshots of altered interfaces.

Name initiations through POST /api/v2/epconv allowed forging displayName in participant sections, spoofing caller identities throughout audio or video classes.

One flaw, notification spoofing, was tracked as CVE-2024-38197, a medium-severity problem (CVSS 6.5) affecting iOS variations as much as 6.19.2, the place sender fields lacked correct validation.​

Microsoft Groups Vulnerability Assault Situations

These vulnerabilities erode the core belief in Groups, turning it right into a deception vector for superior persistent threats (APTs), nation-state actors, and cybercriminals.

Exterior company might infiltrate as insiders, impersonating finance results in harvest credentials or push malware-laden hyperlinks disguised as government directives.

Insiders may disrupt briefings by spoofing calls, spreading confusion in delicate discussions, or enabling enterprise electronic mail compromise (BEC) schemes.

Actual dangers embrace monetary fraud, the place faux CEO notifications immediate wire transfers; privateness breaches from falsified conversations; and espionage through manipulated histories in provide chain assaults.

Risk actors, together with teams like Lazarus, have lengthy focused such platforms for social engineering, as seen in current stories of Groups abuse in ransomware and knowledge exfiltration.

The convenience of chaining these flaws, as an illustration, spoofing a notification adopted by a solid name, amplifies risks, probably fooling customers into revealing secrets and techniques or executing dangerous actions.​

Test Level disclosed the issues on March 23, 2024, with Microsoft acknowledging them on March 25 and confirming fixes progressively.

The message modifying problem was resolved by Could 8, 2024; personal chat alterations by July 31; notifications (CVE-2024-38197) by September 13, after an August rollout; and name spoofing by October 2025.

All points at the moment are addressed throughout purchasers, requiring no person motion past updates. Nevertheless, organizations ought to layer defenses: implement zero-trust verification for identities and units; deploy superior risk prevention to scan payloads in Groups; implement knowledge loss prevention (DLP) insurance policies; and prepare workers on out-of-band validation for high-stakes requests.

Crucial considering stays key to at all times verifying suspicious communications, even from obvious trusted sources. As collaboration instruments evolve, securing human belief is as very important as patching code.​

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Alter, Exploit, Hackers, Manipulate, Messages, Microsoft, Notifications, Teams, Vulnerabilities

Post navigation

Previous Post: Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks
Next Post: Transportation Companies Hacked to Steal Cargo

Related Posts

10 Best Cloud Monitoring Tools in 2025 Cyber Security News
CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units Cyber Security News
Weekly Cybersecurity News Recap – Top Vulnerabilities, Threat and Data Breaches Cyber Security News
Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times Cyber Security News
New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks Cyber Security News
CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
  • Bob Flores, Former CTO of the CIA, Joins Brinker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
  • Bob Flores, Former CTO of the CIA, Joins Brinker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News