• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Microsoft Teams Vulnerability Exposes User Systems

Akinola Ajibola by Akinola Ajibola
December 18, 2024
in Security
Share on FacebookShare on Twitter

Hackers exploited Microsoft Teams to trick a victim into allowing remote access to their PC. Trend Micro studied the attack, which demonstrates the increasing sophistication of cybercriminals’ social engineering efforts.

The attack began with a torrent of phishing emails aimed at the victim. Shortly after, the attacker began a Microsoft Teams call while acting as a trusted client employee.

On a call conversation, the attacker directed the victim to download a remote help application, originally recommending Microsoft Remote help. When installation from the Microsoft Store failed, the attacker switched to AnyDesk, a legal remote desktop tool frequently used by hackers.

AnyDesk, a remote desktop program and application, once installed, the attacker got control of the victim’s computer. They installed many strange files, one of which was recognized as a Trojan.AutoIt.DARKGATE.D.

This malware was deployed using an AutoIt script, which provided remote system control, executed malicious commands, and linked to a command-and-control (C2) server.

After getting access via AnyDesk, the attacker ran commands to gather full system and network configurations. Systeminfo, route print, and ipconfig /all were used to gather information on the system’s hardware, software, and network configuration. The obtained information was saved in a file called 123.txt, most likely for future reconnaissance.

The malware also used defensive evasion techniques. For example, AutoIt scripts were used to identify antivirus software on the machine and avoid detection. Malicious files were also downloaded and extracted into the infiltrated machine’s secret directories.

One especially nasty program, SystemCert.exe, generated additional scripts and executables in temporary directories. These files enabled further malicious activities, such as connecting to a C2 server and downloading further payloads.

Fortunately, the assault was detected before any data was exfiltrated. The root cause study indicated that no sensitive information was stolen, however persistent files and registry entries were created on the victim’s computer. However, this event highlights the vital necessity for strong security measures.

To protect and fight against such assaults, companies should apply the following best practices:

Verify The Third-Party Claims: Always authenticate the affiliations of third-party technical support providers before providing access.

Control remote access tools: To improve security, whitelist approved tools like AnyDesk and require multi-factor authentication (MFA).

Have Training Sessions with Employees: To lessen vulnerability to such assaults, educate staff on social engineering strategies like phishing and vishing (voice phishing).

This event is a striking reminder of how attackers use trust and legitimate platforms like Microsoft Teams to enter systems. Vigilance and proactive security measures are critical for preventing similar incidents in the future.

Related Posts:

  • Screenshot 2023-01-30 at 14.03.31
    Microsoft to Discontinue Remote Desktop Service
  • cyber-hacker-image
    Hackers Exploit Microsoft Teams and Zoom in New…
  • 1_8_VsolmlGbZ-OhZN0wEgrw
    Over 46,000 Grafana Instances Vulnerable to Account Takeover
  • 1743588188581
    Hackers use Microsoft Teams to spread Matanbuchus malware
  • HERO-image-M365Copilot_HeroBanner_WordApp_Prompt_1920x1080-1536×864
    Microsoft 365 Copilot, An AI Solution For Word,…
  • microsoft-eu_medium
    EU Launches Antitrust Investigation Over Microsoft…
  • FotoJet-7-76-635×430
    Microsoft To Integrate Teams Into Outlook
  • Microsoft-Teams-Will-Let-You-Transform-Into-a-3D-Avatar-in-May-scaled
    Microsoft Teams Is Rolling Out 3D Avatars In May.

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: hackersmicrosoft teamsteams
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Copilot Adds Audio Generation with Expressive Voices September 13, 2025
  • Nigerian Government Removes 5% Tax on Call & Data Service September 12, 2025
  • Amid Violent Anti-Corruption Protests, Nepalis Turn to Jack Dorsey’s Bitchat September 12, 2025
  • Bain Sells Data Centres for $4 Billion to HEC-Led Group September 12, 2025
  • AirPods Pro 3 Can Track Your Heart and Translate Live September 10, 2025
  • Apple Watch Ultra 3 Brings 42-Hour Battery and New Health Alerts September 10, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.