The listings featured on this site are from companies from which this site receives compensation and some are co-owned by our parent company. This influence: Rank and manner in which listings are presented.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Organizations Hit by Phishing Attacks via Microsoft Teams

Organizations Hit by Phishing Attacks via Microsoft Teams
Author Image Zane Kennedy
Zane Kennedy First published on September 19, 2023 Former Cybersecurity Researcher

Microsoft has issued an urgent warning regarding a sophisticated phishing campaign targeting organizations using Microsoft Teams, perpetrated by the notorious threat actor group Storm-0324. In a newly detailed report, Microsoft disclosed that since July 2023, Storm-0324 has begun attempting to distribute malicious payloads through external Teams messages, which could then be used to facilitate ransomware attacks.

The mechanism behind these phishing efforts is an open-source tool, TeamsPhisher, which capitalizes on a previously identified but unaddressed security flaw within Microsoft Teams. This tool allows attackers to attach files to messages to external Teams users, thus allowing for malicious payloads to be attached.

Acting as an access broker, Storm-0324 facilitates the entrance of other malicious actors into compromised networks. Historically, the group has been associated with distributing ransomware strains like Sage and GandCrab. Recently, the threat actor has primarily been known for distributing JSSLoader malware to facilitate access for the ransomware-as-a-service group Sangria Tempest (also known as ELBRUS, Carbon Spider, and FIN7).

It's not just corporations that are under threat. In a concerning twist, APT29, a hacking division of the Russian Foreign Intelligence Service (SVR), was found exploiting the same flaw to target organizations, including government entities. Their modus operandi involved tricking targets into approving multifactor authentication (MFA) prompts, ultimately aiming to steal their credentials. With the network compromised, the politically-motivated hacking group could perform espionage undetected.

Responding to the threat, Microsoft has taken several actions. Accounts that have been detected to be partaking in this malicious behavior have been suspended. In addition, Microsoft has attempted to make it more clear when a message is coming from a user outside your organization.

On the user's end, Microsoft advises restricting external communications on Teams if it isn’t necessary, controlling the types of devices that can connect to Teams, educating employees about social engineering, and much more. Microsoft’s full list of recommendations can be found in its report.

About the Author

  • Author Image Zane Kennedy
  • Zane Kennedy Former Cybersecurity Researcher

Zane was a Cybersecurity Researcher and Writer at The How To Guide. His extensive experience in the tech and cybersecurity industries provided readers with accurate and trustworthy news stories and articles. He aimed to help individuals protect themselves through informative content and awareness of cybersecurity's crucial role in today's digital landscape.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address