Microsoft Teams susceptible to malicious GIF, says CyberArk Labs
Penetration testers found that, via the “subdomain takeover vulnerability”, attackers could send malicious GIFs and siphon all data associated with a user’s account.
The malicious file could then spread to other accounts, without any other user action, the researchers showed.
Concerningly, this could all happen by just opening the GIF — not by clicking or sharing it, as would normally be required to effect such an action.
It could also occur without the user’s awareness and effectively ‘worm’ its way through the entire user base for that organisation.
The researchers say this vulnerability could be exploited to impersonate leadership figures in the company and send out false information to employees. In turn, this could lead to financial damage or direct data leakage.
Microsoft Teams has seen a fivefold increase in uptake since the start of COVID-19, as more businesses make the switch to remote work and rely on videoconferencing to stay connected. Given this, the vulnerability had the potential for widespread damage.
However, since identifying the glitch, CyberArk Labs has now worked out a resolution in partnership with the Microsoft Security Research Centre.
The US Department of Justice has issued warrants for five alleged members of the APT41 cybercrime...
A survey by Gartner has found that cybersecurity analysts are concerned about the rapidly...
Security and risk leaders have been advised to balance risk, trust and opportunity to help their...