Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit Microsoft Teams, Posing as IT Help Desk for Screen Sharing and Remote Access

Posted on August 29, 2025August 29, 2025 By CWS

A complicated phishing marketing campaign has been recognized, the place menace actors impersonate IT helpdesk personnel by way of Groups’ exterior communication options, exploiting the platform’s default configuration to bypass conventional electronic mail safety measures and acquire unauthorized screen-sharing and remote-control capabilities.

The assaults leverage Groups’ exterior collaboration options, that are enabled by default in Microsoft 365 tenants, permitting attackers to provoke contact with organizational customers with out prior authentication. 

Key Takeaways1. Default Groups settings allow direct IT helpdesk impersonation assaults, bypassing electronic mail safety.2. Voice calls keep away from safety warnings, resulting in display screen sharing and distant entry.3. Monitor ChatCreated/MessageSent logs for exterior .onmicrosoft.com domains.

This basic design alternative has created an unprecedented assault floor that mixes social engineering with reputable platform performance to devastating impact.

Voice Name Phishing and Distant Management 

In keeping with Axon Group reviews, Cybercriminals have developed a number of subtle assault vectors inside the Microsoft Groups ecosystem, every exploiting completely different points of the platform’s communication capabilities. 

The first assault technique entails one-on-one chat phishing, the place attackers use compromised Groups accounts or create malicious Entra ID tenants with .onmicrosoft.com domains – Microsoft’s default fallback domains for enterprise accounts with out customized area configurations.

The technical implementation begins with menace actors conducting reconnaissance by way of Groups’ person search performance, which permits exterior customers to confirm goal electronic mail addresses and ensure message supply capabilities. 

When profitable, attackers can provoke direct communication, although Microsoft has applied safety warnings, together with “exterior communication warning” pop-ups and “potential phishing warning messages” that seem primarily based on algorithmic menace detection.

Nevertheless, attackers have found strategies to bypass these safety measures by way of voice name phishing (vishing). 

Pretend IT Helpdesk calling sufferer inside Microsoft Groups

In contrast to text-based communications, voice calls from exterior Groups customers generate no warning pop-ups, making a seamless assault vector. 

As soon as belief is established by way of voice communication, attackers request display screen sharing permissions, enabling them to watch sufferer actions and doubtlessly information them by way of malicious actions.

Content material sharing configuration on Microsoft Groups

Probably the most regarding improvement entails distant management capabilities. Whereas Microsoft has applied safety controls that disable the “Give Management” and “Request Management” choices by default for exterior contributors, organizations which have modified these settings face important publicity, in keeping with the Axon Group. 

Attackers can doubtlessly acquire full distant entry to sufferer workstations by way of Groups’ built-in distant management options, eliminating the necessity for conventional Distant Monitoring and Administration (RMM) instruments like QuickAssist or AnyDesk.

Detection Methodologies

Safety groups can establish these assaults by way of particular Microsoft 365 audit log entries that function digital forensic artifacts. 

The first indicators embody ChatCreated occasions that set up new “OneOnOne” chats between attackers and victims, containing essential metadata together with Chat Thread IDs, sender show names, electronic mail addresses, and Group IDs for each events.

MessageSent logs complement ChatCreated entries by offering sender IP addresses and embedded URL info, although message content material itself is just not logged. 

Further forensic indicators embody UserAccepted occasions when victims click on “Settle for” buttons in exterior sender pop-ups, and TeamsImpersonationDetected occasions triggered by Microsoft’s model impersonation detection algorithms.

Superior menace searching requires monitoring for particular M365 audit log patterns, together with ChatCreated operations with participant_info:has_foreign_tenant_users = true and communication_type = “OneOnOne” parameters. 

As menace actors proceed refining these strategies, organizations should implement complete monitoring of Groups audit logs, person education schemes centered on IT helpdesk impersonation ways, and restrictive exterior communication insurance policies to mitigate this evolving menace panorama.

Discover this Story Attention-grabbing! Comply with us on LinkedIn and X to Get Extra On the spot Updates.

Cyber Security News Tags:Access, Desk, Exploit, Hackers, Microsoft, Posing, Remote, Screen, Sharing, Teams

Post navigation

Previous Post: TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies
Next Post: Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations

Related Posts

Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers Cyber Security News
Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams Cyber Security News
LexisNexis Risk Solutions Data Breach Exposes 364,000 individuals personal Data Cyber Security News
NX Build Tool Hacked with Malware That Checks for Claude or Gemini to Find Wallets and Secrets Cyber Security News
Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight Cyber Security News
New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR?
  • Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain
  • Silver Fox APT Hackers Leveraging Vulnerable Driver to Attack Windows 10 and 11 Systems by Evading EDR/AV
  • Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations
  • Hackers Exploit Microsoft Teams, Posing as IT Help Desk for Screen Sharing and Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR?
  • Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain
  • Silver Fox APT Hackers Leveraging Vulnerable Driver to Attack Windows 10 and 11 Systems by Evading EDR/AV
  • Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations
  • Hackers Exploit Microsoft Teams, Posing as IT Help Desk for Screen Sharing and Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News