Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Microsoft warns of a new phishing campaign targeting businesses via Teams messages

A dangerous phishing attack threatens businesses via Microsoft Teams: here's what IT professionals need to know

Microsoft warns of a new phishing campaign that uses messages on Teams to infiltrate corporate networks. The Storm-0324 cluster distributes payloads such as downloaders, banking Trojans, and ransomware. Emails with fake themes are also used to deceive users. Microsoft has made security improvements to counter the threat.
This pill is also available in Italian language

Microsoft is warning of a new phishing campaign being undertaken by an initial access broker that involves using Teams messages as bait to infiltrate corporate networks. The tech giant's Threat Intelligence team is monitoring the cluster under the name Storm-0324, also known by the names TA543 and Sagrid. “As of July 2023, Storm-0324 has been observed delivering payloads using an open source tool to send phishing lures via Microsoft Teams chat,” the company said, adding that this marks a shift from the use of Initial email-based infection. Storm-0324 operates in the cyber criminal economy as a payload distributor, offering a service that allows the propagation of various payloads using evasive infection chains, including downloaders, banking trojans, ransomware and modular toolkits such as Nymaim, Gozi, TrickBot, IcedID, Gootkit, Dridex, Sage, GandCrab and JSSLoader.

Phishing campaign

The actor's attack sequences in the past have used emails with fake invoice and payment themes to trick users into downloading ZIP files hosted on SharePoint that deliver JSSLoader, a malware loader capable of profiling infected machines and load additional payloads. “The actor's email is highly evasive, using traffic distribution systems (TDS) such as BlackTDS and Keitaro, which provide identification and filtering capabilities to tailor user traffic,” Microsoft said. “This filtering capability allows attackers to evade detection by certain IP address ranges that could be security solutions, such as malware sandboxes, while successfully redirecting victims to their malicious download site.”

Security updates

The access gained by the malware paves the way for ransomware-as-a-service (RaaS) actor Sangria Tempest (also known as Carbon Spider, ELBRUS, and FIN7) to conduct post-exploitation actions and install file-encrypting malware . The modus operandi received a revamp in July 2023, where phishing lures are sent via Teams with malicious links leading to a malicious ZIP file hosted on SharePoint. This is achieved by leveraging an open source tool called TeamsPhisher, which allows users in the Teams tenant to attach files to messages sent to external tenants taking advantage of an issue first highlighted by JUMPSEC in June 2023.

Microsoft interventions

The company said it has made several security improvements to combat the threat and has "suspended identified accounts and tenants associated with inauthentic or fraudulent behavior." “Because Storm-0324 transfers access to other threat actors, identifying and remediating Storm-0324 activity can prevent more dangerous subsequent attacks such as ransomware,” Microsoft further emphasized.

Follow us on Facebook for more pills like this

09/13/2023 09:52

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated