If your organization uses Microsoft Teams, then you definitely want to hear about a new way bad actors are exploiting this newly discovered cyber attack tool.
"TeamsPhisher," a new tool recently discovered on GitHub, gives cybercriminals a new way to deliver malicious files directly to any Teams user. The genesis of this new cyber attack tool was published by the US Navy Red Team due to a recently discovered vulnerability in Microsoft Teams. "TeamsPhisher" can also be used in internal or external environments.
In an updated statement from Microsoft to Bleeping Computer, "We’re aware of this report and have determined that it relies on social engineering to be successful. We encourage customers to practice good computing habits online, including exercising caution when clicking on links to web pages, opening unknown files, or accepting file transfers."
I want to emphasize that this tool relies on social engineering. By definition social engineering is, "the art of manipulating, influencing, or deceiving you in order to gain control over your computer system." It only takes one wrong judgment call from one user to let bad actors leverage this cyber attack tool and impact your entire organization.
Start taking steps within your organization now with new-school security awareness training. With continual end user education, your users will learn how to spot and report any suspicious activity if they ever encounter a suspicious Microsoft Teams meeting.
Dark Reading has the full story.