A Microsoft Teams social engineering attack happened recently on the platform
3 min. read
Updated on
Read our disclosure page to find out how can you help MSPoweruser sustain the editorial team Read more
A Microsoft Teams social engineering attack was conducted by the Russian threat actor Midnight Blizzard recently. The threat actor used previously compromised Microsoft 365 tenants to create new domains that appear as technical support entities. Under these disguises, Midnight Blizzard then used Teams messages to attempt to steal credentials from organizations by engaging a user and eliciting approval of multifactor authentication (MFA) prompts.
All organizations using Microsoft Teams are encouraged to reinforce security practices and treat any authentication requests not initiated by the user as malicious.
According to their latest investigation, approximately fewer than 40 global organizations were affected by the Microsoft Teams social engineering attack. As with previous attacks from these threat actors, the organizations were mainly government, non-government organizations (NGOs), IT services, technology, discrete manufacturing, and media sectors. This makes sense, given that Midnight Blizzard is a Russian-threat actor, previously attributed by the US and UK governments as the Foreign Intelligence Service of the Russian Federation.
The attacks happened in May 2023. If you remember, another threat actor, Storm-0558, caused some serious damage to Microsoft’s servers around that time as well.
Midnight Blizzard, however, uses real Microsoft Teams credentials from compromised accounts to try to convince users to enter the code into the prompt on their device. They do so by masquerading as a technical support or security team.
According to Microsoft, Midnight Blizzard does so in 3 steps:
- The target user may receive a Microsoft Teams message request from an external user posing as a technical support or security team.
- If the target user accepts the message request, the user then receives a Microsoft Teams message from the attacker attempting to convince them to enter a code into the Microsoft Authenticator app on their mobile device.
- If the targeted user accepts the message request and enters the code into the Microsoft Authenticator app, the threat actor is granted a token to authenticate as the targeted user. The actor gains access to the userโs Microsoft 365 account, having completed the authentication flow.
Microsoft released a list of the email names that you should be careful about:
Indicators of compromise
Indicator | Type | Description |
msftprotection.onmicrosoft[.]com | Domain name | Malicious actor-controlled subdomain |
identityVerification.onmicrosoft[.]com | Domain name | Malicious actor-controlled subdomain |
accountsVerification.onmicrosoft[.]com | Domain name | Malicious actor-controlled subdomain |
azuresecuritycenter.onmicrosoft[.]com | Domain name | Malicious actor-controlled subdomain |
teamsprotection.onmicrosoft[.]com | Domain name | Malicious actor-controlled subdomain |
However, you can protect yourself and your organization from the Microsoft Teams social engineering attacks by following these recommendations:
- Pilot and start deployingย phishing-resistant authentication methodsย for users.
- Implementย Conditional Access authentication strengthย to require phishing-resistant authentication for employees and external users for critical apps.
- Specify trusted Microsoft 365 organizationsย to define which external domains are allowed or blocked to chat and meet.
- Keepย Microsoft 365 auditingย enabled so that audit records could be investigated if required.
- Understand and select theย best access settings for external collaborationย for your organization.
- Allow only known devicesย that adhere toย Microsoftโs recommended security baselines.
- Educate usersย aboutย social engineering and credential phishing attacks, including refraining from entering MFA codes sent via any form of unsolicited message.
- Educate Microsoft Teams users to verify โExternalโ tagging on communication attempts from external entities, be cautious about what they share, and, and never share their account information or authorize sign-in requests over chat.
- Educate users toย review sign-in activityย and mark suspicious sign-in attempts as โThis wasnโt meโ.
- Implementย Conditional Access App Control in Microsoft Defender for Cloud Appsย for users connecting from unmanaged devices.
What do you think about these Microsoft Teams social engineering attacks? Let us know in the comments below!
User forum
0 messages