Microsoft Teams susceptible to malicious GIF, says CyberArk Labs
Penetration testers found that, via the “subdomain takeover vulnerability”, attackers could send malicious GIFs and siphon all data associated with a user’s account.
The malicious file could then spread to other accounts, without any other user action, the researchers showed.
Concerningly, this could all happen by just opening the GIF — not by clicking or sharing it, as would normally be required to effect such an action.
It could also occur without the user’s awareness and effectively ‘worm’ its way through the entire user base for that organisation.
The researchers say this vulnerability could be exploited to impersonate leadership figures in the company and send out false information to employees. In turn, this could lead to financial damage or direct data leakage.
Microsoft Teams has seen a fivefold increase in uptake since the start of COVID-19, as more businesses make the switch to remote work and rely on videoconferencing to stay connected. Given this, the vulnerability had the potential for widespread damage.
However, since identifying the glitch, CyberArk Labs has now worked out a resolution in partnership with the Microsoft Security Research Centre.
There were 29,000 malicious mobile apps detected in 2020 Q1, up from 14,500 in the same quarter...
NAB has signed on 120,000 customers to its VoiceID biometrics authentication service since its...
ESET researchers have uncovered a new malware toolkit that appears to be designed to exfiltrate...