Microsoft Eliminates Cyber Attack Flaws

As more business is conducted from remote locations, attackers are focusing their efforts on exploiting the key collaboration technologies, like Zoom and Microsoft Teams, that companies and their employees depend on to work togethe from remote locations. Microsoft Teams, like many workplace collaboration tools, has seen huge growth in the past month, due to coronavirus lockdown rules.

Microsoft's threat protection intelligence team has warned of a "significant and growing" cyber security threat that can deliver a devastating payload. 

A security problem in Microsoft Teams meant cyber-attacks could be initiated via funny Gif images, researchers have revealed. Like many chat apps, Teams lets colleagues send each other whimsical animated Gif images. But CyberArk researchers discovered a problem that meant viewing a Gif could let hackers compromise an account and steal data. Microsoft has since patched the security hole, researchers said.

The flaw involved a compromised subdomain serving up the malicious images.All a user had to do was view the Gif to allow an attacker to scrape data from their account. If left open, the flaw could have led to widespread data theft, ransomware attacks and corporate espionage, the team added.

The attack steals security tokens when a user loads an image but the end user would just see the Gif sent to them, and nothing else. CyberArk said it notified Microsoft of the vulnerability on 23 March and a patch was released at the endo of April. There is no evidence it was ever exploited by cyber-criminals.

Cyberark researchers say the a similar attack could be replicated in future on other platforms. While the attack pattern is not easy to set up, it is a workable attack and could spread very rapidly. 
 

Microsoft:     CyberArk:         Forbes:         BBC

You Migh Also Read:

Zoom-Bombing Hijackers:


 

 

« Hackers Are Selling Your Social Media Data
Rising Demand of Cybersecurity Skills Following Recent Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

AFCERT

AFCERT

AFCERT is the national Computer Emergency Response Team for Afghanistan.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Falanx Cyber

Falanx Cyber

Falanx Cyber provides enterprise-class cyber security services and solutions. We deliver end-to-end cyber capabilities, either as specific engagements or as fully-managed services.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

Constella Intelligence

Constella Intelligence

Constella Intelligence provides digital risk protection services to quickly and efficiently disrupt cyber attacks and data breaches before they occur.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Cyber Legion

Cyber Legion

Cyber Legion Ltd is a UK-based Cyber Security as a Service (CSaaS) start-up that provides IT security testing services to various organizations around the globe.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

CyberMaxx

CyberMaxx

At CyberMaxx, our approach to cybersecurity provides end-to-end coverage for our customers – we use offense to fuel defense.