Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed

Posted on November 4, 2025November 4, 2025 By CWS

Nov 04, 2025Ravie Lakshmanan
Cybersecurity researchers have disclosed particulars of 4 safety flaws in Microsoft Groups that might have uncovered customers to severe impersonation and social engineering assaults.
The vulnerabilities “allowed attackers to control conversations, impersonate colleagues, and exploit notifications,” Test Level stated in a report shared with The Hacker Information.
Following accountable disclosure in March 2024, a few of the points had been addressed by Microsoft in August 2024 below the CVE CVE-2024-38197, with subsequent patches rolled out in September 2024 and October 2025.
In a nutshell, these shortcomings make it potential to change message content material with out leaving the “Edited” label and sender id and modify incoming notifications to alter the obvious sender of the message, thereby permitting an attacker to trick victims into opening malicious messages by making them seem as if they’re coming from a trusted supply, together with high-profile C-suite executives.

The assault, which covers each exterior visitor customers and inner malicious actors, poses grave dangers, because it undermines safety boundaries and allows potential targets to carry out unintended actions, reminiscent of clicking on malicious hyperlinks despatched within the messages or sharing delicate information.
On prime of that, the failings additionally made it potential to alter the show names in personal chat conversations by modifying the dialog matter, in addition to arbitrarily modify show names utilized in name notifications and throughout the name, allowing an attacker to forge caller identities within the course of.
“Collectively, these vulnerabilities present how attackers can erode the basic belief that makes collaboration workspace instruments efficient, turning Groups from a enterprise enabler right into a vector for deception,” the cybersecurity firm stated.

Microsoft has described CVE-2024-38197 (CVSS rating: 6.5) as a medium-severity spoofing concern impacting Groups for iOS, which might permit an attacker to change the sender’s identify of a Groups message and probably trick them into disclosing delicate info by way of social engineering ploys.
The findings come as risk actors are abusing Microsoft’s enterprise communication platform in varied methods, together with approaching targets and persuading them to grant distant entry or run a malicious payload below the guise of help personnel.

Microsoft, in an advisory launched final month, stated the “intensive collaboration options and world adoption of Microsoft Groups make it a high-value goal for each cybercriminals and state-sponsored actors” and that its messaging (chat), calls, and conferences, and video-based screen-sharing options are weaponized at completely different levels of the assault chain.
“These vulnerabilities hit on the coronary heart of digital belief,” Oded Vanunu, head of product vulnerability analysis at Test Level, informed The Hacker Information in an announcement. “Collaboration platforms like Groups at the moment are as crucial as electronic mail and simply as uncovered.”
“Our analysis reveals that risk actors need not break in anymore; they only must bend belief. Organizations should now safe what individuals imagine, not simply what techniques course of. Seeing is not believing anymore, verification is.”

The Hacker News Tags:Attackers, Bugs, Colleagues, Edit, Impersonate, Messages, Microsoft, Teams, Unnoticed

Post navigation

Previous Post: SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers
Next Post: 2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks

Related Posts

Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access The Hacker News
Why Business Impact Should Lead the Security Conversation The Hacker News
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks The Hacker News
FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections The Hacker News
Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw The Hacker News
How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
  • Bob Flores, Former CTO of the CIA, Joins Brinker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
  • Bob Flores, Former CTO of the CIA, Joins Brinker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News