Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
A new tool called “TeamsPhisher” has been made available on GitHub, allowing attackers to exploit a recently disclosed vulnerability in Microsoft Teams. This tool is designed to deliver malicious files to targeted Teams users within an organization. It specifically works in environments where internal Teams users can communicate with external users or tenants. The tool exploits a vulnerability highlighted by security services company Jumpsec. TeamsPhisher automates the attack process, utilizing techniques from various sources and verifying the target’s ability to receive external messages.
source: phishing message
The tool uploads an attachment to the sender’s Sharepoint and creates a new thread with the target user, sending them a message with a Sharepoint attachment link. TeamsPhisher requires a Microsoft Business account with a valid Teams and Sharepoint license. It offers a “preview mode” for verification and additional features such as sending secure file links and specifying transmission delays.
The security issue that TeamsPhisher exploits remains unresolved, with Microsoft stating that it does not meet the bar for immediate servicing. While the tool was developed for authorized red team operations, threat actors could potentially utilize it to deliver malware without detection. Organizations are advised to disable communications with external tenants if not necessary or create an allow-list with trusted domains to mitigate the risk.
The security services company has strongly advised organizations that utilize Microsoft Teams to carefully assess their business requirements for enabling communications between internal Teams users and external tenants. The company suggests that if there is no immediate need for regular communication with external parties, organizations should consider tightening their security controls and potentially disabling the option altogether.
“If you are not currently using Teams for regular communication with external tenants, tighten up your security controls and remove the option altogether,” the company advised.
Until Microsoft addresses the security issue, users are encouraged to exercise caution when interacting with links, opening files, or accepting file transfers.