• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Microsoft Teams Users Warned Of Malicious Files From Hackers

Olagoke Ajibola by Olagoke Ajibola
February 22, 2022
in Security
Share on FacebookShare on Twitter

Microsoft Teams: What is it and how does it work? | Tech & Learning

With regards to the pandemic and the need to connect remotely while getting work done, the Microsoft Teams have continues to thrive globally. In July 2021, Teams recorded an increase that contributed to it whopping 270 million monthly active users. As this growth may feel remarkable and worthy, cybercriminals are also on the loose to target millions of users by setting Microsoft Teams as a launchpad for phishing and malware attacks.

According to a blog post by cloud security firm Avanan, it is now observed that starting since January 2022, hackers are exploiting Teams conversations by dropping malicious executable files. Avanan mentions that this file writes data to the Windows registry, installs DLL files and creates shortcut links that permit the program to self-administer. With thousands of these attacks identified and analyzed by Avanan, the company has come to a conclusion that these .exe files are being used by hackers in Microsoft Teams. The rapid rise in these team attacks has proven a source of concern to unsuspected users.

The practice of this attack have identified that hackers will attach .exe files through Teams chats, a Trojan is installed on the end-user’s computer. In the attack done via email, Avanan have identified that hackers are hacking into Teams. This hack is done with East-West attacks that start via email, or by simply spoofing a user. An .exe file called “User Centric” is then attached to a chat. This Trojan files when clicked, then install as DLL files and create shortcut links to self-administer and hackers can eventually take over the user’s computer. Using an executable file, or a file that contains instructions for the system to execute, hackers can install malicious file libraries (DLL files) that allow the program to self-administer and take control over the computer.

In other to attach malicious files to a Teams chat, the first step is accessing Teams. Hackers have a number of ways that is carried out. Hackers can gain entry by compromising a partner organization and listen in on inter-organizational chats. They can compromise an email address and use that to access Teams. They can steal Microsoft 365 credentials from a previous phishing campaign, giving them carte blanche access to Teams and the rest of the Office suite. Given that hackers are quite adept at compromising Microsoft 365 accounts using traditional email phishing methods, they’ve learned that the same credentials work for Teams.

Microsoft Teams Will Soon Get Low Bandwidth Mode to Improve Video Calls  Over Poor Connections | Technology News

According to Avanan, once entry into an organization is secured, an attacker is already informed what technology is being used to protect it. That means they can tell what malware will bypass existing protections. The fact that default Teams protections are lacking compounds this problem, as scanning for malicious links and files is limited. Further, many email security solutions do not provide robust protection for Teams. Hackers, who can access Teams accounts via East-West attacks, or by leveraging the credentials they harvest in other phishing attacks, have carte blanche to launch attacks against millions of unsuspecting users.  This attack have shown that hackers have gained a deep understand of Teams as a potential attack vector as the usage continues to grow rapidly. Avanan stated that a significant increase in these sorts of attacks should be expected.

For Teams user it’s time to be aware and refuse the urge to download any files from unknown sources. Users are encourage to reach out to IT when an unfamiliar file is suspected. Organizations are also advised to deploy robust, full-suite security that secures all lines of business communication, including Teams.  News of this Teams bug comes as Windows 10 users are being issued alerts on the resurgence of the nasty QBot bug, a malware that dates as far back as 2007, now with more terrifying outcomes. According to security experts at Digital Forensics and Incident Response (DFIR), this malware can give hackers full access to personal files such as emails, passwords and web browsing history within 30 minutes of getting into a victims system. The malware sharing thrives via fake phishing emails which try to trick users into downloading the bug with subject lines that include tax payment reminders, job offers, and even COVID-19 alerts.

Related Posts:

  • Microsoft Teams
    Microsoft Teams Vulnerability Exposes User Systems
  • 1743588188581
    Hackers use Microsoft Teams to spread Matanbuchus malware
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • Outlook-search-Problem-after-Windows-10-security-patch-confirmed
    Microsoft Confirms June Outlook Outages Was A DDoS Attack
  • c4398f2d-a521-487b-b68e-c986db06f158
    Microsoft Disables ActiveX in Office 2024 &…
  • VoidProxy_adminPanel_Login
    VoidProxy Targets Microsoft 365 & Google Accounts
  • linkedin messaging
    How Hackers Spread RAT Malware via DLL Sideloading…
  • Microsoft
    Microsoft Shuts 338 Domains in Nigeria-Linked…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: AccessAttackAvananemailfilehackersinternetmalwaremicrosoftPhishingteamuserswebsite
Olagoke Ajibola

Olagoke Ajibola

Olagoke Ajibola is a creative writer and content producer with an eye for details and excellence. He has a demonstrated history of telling stories for TV, Film and Online. Aside from being fascinated by the power of imagination, his other interest are travel, sport, reading and meeting people.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Microsoft Gaming Revenue Falls as Xbox Hardware Sales Drop January 29, 2026
  • CBN Upgrades OPay, Moniepoint and Others to National Licences January 29, 2026
  • Samsung Profit Surges as AI Chip Demand Booms January 29, 2026
  • Meta Reports Strong Q4, Full-Year 2025 as Ad Revenue Surges January 29, 2026
  • Tesla’s Vehicle Margins Fall as Musk Focuses on AI and Robotics January 29, 2026
  • Microsoft Earnings Show Rising AI Spend, Cloud Under Scrutiny January 29, 2026
  • YouTubers Sue Snap Over Copyright Infringement in AI Models January 28, 2026
  • Sony Plans A State of Play Broadcast in February January 28, 2026
  • TikTok Avoids Trial, Settles Lawsuit Over Addiction Claims January 27, 2026
  • Ezra Olubi Sues David Hundeyin for ₦140M Over X Defamation January 27, 2026
  • Lagos & MTN Team Up on Eco-Friendly Obalende Bus Park January 27, 2026
  • France Ditches Microsoft Teams, Zoom for Homegrown ‘Sovereign’ Platform January 27, 2026

Browse Archives

January 2026
MTWTFSS
 1234
567891011
12131415161718
19202122232425
262728293031 
« Dec    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.