Ron  Cartwright

Ron Cartwright

1603519200

Microsoft Teams Phishing Attack Targets Office 365 Users

Researchers are warning of a phishing campaign that pretends to be an automated message from Microsoft Teams. In reality, the attack aims to steal Office 365 recipients’ login credentials.

Teams is Microsoft’s popular collaboration tool, which has particularly risen in popularity among remote workforces during the pandemic – making it an attractive brand for attackers to impersonate. This particular campaign was sent to between 15,000 to 50,000 Office 365 users, according to researchers with Abnormal Security on Thursday.

“Because Microsoft Teams is an instant-messaging service, recipients of this notification might be more apt to click on it so that they can respond quickly to whatever message they think they may have missed based on the notification,” said researchers in a Thursday analysis.

The initial phishing email displays the name “There’s new activity in Teams,” making it appear like an automated notification from Microsoft Teams.

As seen in the picture below, the email tells recipient that their teammates are trying to reach them, warning them they have missed Microsoft Team chats and showing an example of a teammate chat that asks them to submit something by Wednesday of next week.

Erin Ludert, data scientist at Abnormal Security, told Threatpost researchers suspect attackers are using more of a “spray” tactic here, as the employee referenced in the chats doesn’t appear to be an employee of the company that received the attack.

The phishing emails. Credit: Abnormal Security

To respond, the email urges the recipient to click on the “Reply in Teams” button – However, this leads to a phishing page.

“Within the body of the email, there are three links appearing as ‘Microsoft Teams’, ‘(contact) sent a message in instant messenger’, and ‘Reply in Teams’,” according to researchers. “Clicking on any of these leads to a fake website that impersonates the Microsoft login page. The phishing page asks the recipient to enter their email and password.”

Researchers said that the phishing landing page also looks convincingly like a Microsoft login page with the start of the URL containing “microsftteams.” If recipients are convinced to input their Microsoft credentials into the page, they are unwittingly handing them over to attackers, who can then use them for an array of malicious purposes – including account takeover.

With the ongoing pandemic, worries about cyberattackers leveraging enterprise friendly collaboration brands like Microsoft Teams, Zoom and Skype have been piqued. In May, a convincing campaign that impersonated notifications from Microsoft Teams in order to steal the Office 365 credentials of employees circulated, with two separate attacks that targeted as many as 50,000 different Teams users.

#hacks #vulnerabilities #web security #credentials #malicious email #malicious link #microsoft #microsoft teams #office 365 #phishing campaign #phishing emails #phishing link

What is GEEK

Buddha Community

Microsoft Teams Phishing Attack Targets Office 365 Users
Ron  Cartwright

Ron Cartwright

1603519200

Microsoft Teams Phishing Attack Targets Office 365 Users

Researchers are warning of a phishing campaign that pretends to be an automated message from Microsoft Teams. In reality, the attack aims to steal Office 365 recipients’ login credentials.

Teams is Microsoft’s popular collaboration tool, which has particularly risen in popularity among remote workforces during the pandemic – making it an attractive brand for attackers to impersonate. This particular campaign was sent to between 15,000 to 50,000 Office 365 users, according to researchers with Abnormal Security on Thursday.

“Because Microsoft Teams is an instant-messaging service, recipients of this notification might be more apt to click on it so that they can respond quickly to whatever message they think they may have missed based on the notification,” said researchers in a Thursday analysis.

The initial phishing email displays the name “There’s new activity in Teams,” making it appear like an automated notification from Microsoft Teams.

As seen in the picture below, the email tells recipient that their teammates are trying to reach them, warning them they have missed Microsoft Team chats and showing an example of a teammate chat that asks them to submit something by Wednesday of next week.

Erin Ludert, data scientist at Abnormal Security, told Threatpost researchers suspect attackers are using more of a “spray” tactic here, as the employee referenced in the chats doesn’t appear to be an employee of the company that received the attack.

The phishing emails. Credit: Abnormal Security

To respond, the email urges the recipient to click on the “Reply in Teams” button – However, this leads to a phishing page.

“Within the body of the email, there are three links appearing as ‘Microsoft Teams’, ‘(contact) sent a message in instant messenger’, and ‘Reply in Teams’,” according to researchers. “Clicking on any of these leads to a fake website that impersonates the Microsoft login page. The phishing page asks the recipient to enter their email and password.”

Researchers said that the phishing landing page also looks convincingly like a Microsoft login page with the start of the URL containing “microsftteams.” If recipients are convinced to input their Microsoft credentials into the page, they are unwittingly handing them over to attackers, who can then use them for an array of malicious purposes – including account takeover.

With the ongoing pandemic, worries about cyberattackers leveraging enterprise friendly collaboration brands like Microsoft Teams, Zoom and Skype have been piqued. In May, a convincing campaign that impersonated notifications from Microsoft Teams in order to steal the Office 365 credentials of employees circulated, with two separate attacks that targeted as many as 50,000 different Teams users.

#hacks #vulnerabilities #web security #credentials #malicious email #malicious link #microsoft #microsoft teams #office 365 #phishing campaign #phishing emails #phishing link

Chet  Lubowitz

Chet Lubowitz

1595429220

How to Install Microsoft Teams on Ubuntu 20.04

Microsoft Teams is a communication platform used for Chat, Calling, Meetings, and Collaboration. Generally, it is used by companies and individuals working on projects. However, Microsoft Teams is available for macOS, Windows, and Linux operating systems available now.

In this tutorial, we will show you how to install Microsoft Teams on Ubuntu 20.04 machine. By default, Microsoft Teams package is not available in the Ubuntu default repository. However we will show you 2 methods to install Teams by downloading the Debian package from their official website, or by adding the Microsoft repository.

Install Microsoft Teams on Ubuntu 20.04

1./ Install Microsoft Teams using Debian installer file

01- First, navigate to teams app downloads page and grab the Debian binary installer. You can simply obtain the URL and pull the binary using wget;

$ VERSION=1.3.00.5153
$ wget https://packages.microsoft.com/repos/ms-teams/pool/main/t/teams/teams_${VERSION}_amd64.deb

#linux #ubuntu #install microsoft teams on ubuntu #install teams ubuntu #microsoft teams #teams #teams download ubuntu #teams install ubuntu #ubuntu install microsoft teams #uninstall teams ubuntu

Wilford  Pagac

Wilford Pagac

1600448400

Office 365 Phishing Attack Leverages Real-Time Active Directory Validation

Researchers have uncovered a phishing attack using a new technique: Attackers are making use of authentication APIs to validate victims’ Office 365 credentials – in real time – as they enter them into the landing page.

Authentication APIs are used by apps and services running on the users’ behalf to access their data, Prashanth Arun, head of Data Science at Armorblox, told Threatpost. Office 365 requires app registrations to use APIs – but registrations require only an email address, making them seamless for attackers to leverage. Some additional configuration for the app also requires users to specify a website to “receive” authentication info, Arun added.

In a phishing attack recently spotted by researchers, the attacker used the authentication APIs to cross check the credentials of a senior executive at a large enterprise firm with the organization’s Azure Active directory. Active Directory (AD) is Microsoft’s proprietary directory service, which allows administrators to manage permissions and access to network resources. The authentication APIs use Azure AD to provide authentication services.

#hacks #web security #active directory #authentication api #credentials #email attack #microsoft #microsoft active directory #office 365 #phishing attack #phishing email

Microsoft Office 365 Phishing Attack Uses Multiple CAPTCHAs

Researchers are warning of an ongoing Office 365 credential-phishing attack that’s targeting the hospitality industry – and using visual CAPTCHAs to avoid detection and appear legitimate.

CAPTCHAs – commonly utilized by websites like LinkedIn and Google – are a type of challenge–response test used to determine whether or not the user is human, such as clicking on the parts of a grid that have a specific object pictured. Cybercriminals have previously utilized CAPTCHAs as a way to defeat automated crawling systems, ensure that a human is interacting with the page and make the phishing landing page appear legitimate.

Though the use of CAPTCHAS in phishing attacks is nothing groundbreaking, this attack shows that the technique works – so much so that the attackers in this campaign used three different CAPTCHA checks on targets, before finally bringing them to the phishing landing page, which poses as a Microsoft Office 365 log-in page.

“Two important things are happening here,” said researchers with Menlo Security, in a post this week. “The first is that the user is made to think that this is a legitimate site, because their cognitive bias has trained them to believe that checks like these appear only on benign websites. The second thing this strategy does is to defeat automated crawling systems attempting to identify phishing attacks.”

Menlo Security’s Director of Security Research, Vinay Pidathala, told Threatpost said that researchers are unsure of how many users were specifically targeted, however, the industries targeted by this campaign were primarily technology, insurance, and finance and banking.

The multiple CAPTCHAs serve as backups, in case the first one gets defeated by automated systems, said researchers.

In the first CAPTCHA check, targets are simply asked to check a box that says “I’m not a robot.”

After that, they are then taken to a second CAPTCHA that requires them to select for instance all the picture tiles that match bicycles, followed by a third CAPTCHA asking them to identify, say, all the pictures that match a crosswalk. Attackers also do not use the same CAPTCHAs – researchers said, during their testing they came across at least four different images utilized.

Finally, after passing all these checks, the target is taken to the final landing page, which impersonates an Office 365 log-in page, in an attempt to steal the victims’ credentials.

#cloud security #web security #captcha #compromised email #credential theft #domain #email credentials #hack #menlo security #microsoft #office 365 #phishing #phishing attack #recaptcha #scam

How to Troubleshoot Microsoft Team Sign in Errors? - www.office.com/setup


<strong>Solution To Fix Microsoft Team Sign in Errors:</strong>
<ul>
 	<li><strong> Check Network Issues:</strong></li>
</ul>
<strong>Change Network Connection:</strong>

If in case, your office has so many network connections, then you should disconnect from the current network. After this, you should try to connect to different Internet sources. Now, you have to launch Microsoft Teams and again try to log in. If you successfully, sign in then you should disconnect and then again connect to the original network. At the end, you should check if the connection works or not.

<strong>Use Cellular Network: </strong>

If the user, try to sign in to Microsoft Teams from their Smartphone, then you should turn off Wi-Fi. After this, you should enable cellular data and then again try to sign in. If you can successfully signed in, then you should connect to the Wi-Fi network and then check that the issues is solved or not. <a href="https://ms-office.us.com/"><strong>www office com setup</strong></a>
<ul>
 	<li><strong> Check the Service Issues:</strong></li>
</ul>
If you find Microsoft Teams desktop client is not working, then you should try to access the web client. And the user can access it from teams.microsoft.com. But if the web client is also not working, then you should try to sign in by using your Smartphone. If Microsoft Teams is working on your Smartphone, then it is a client-specific issue. But if the sign-in issue is still there in your Smartphone, then you should check Microsoft Teams forums for service-related updates. After this, you should check <a href="https://bit.ly/2w2LDEZ"><strong>Office 365</strong></a> Admin Portal for any service-related updates. Or, you can receive all the service-related updates from the Microsoft Teams’ social media accounts. If the problem is a service-related issue, then it is advised that you should not take any action because problem will solve automatically after few hours.
<ul>
 	<li><strong> Other Solutions:</strong></li>
</ul>
You should check that the time and date in your computer system is correct. Always keep in mind that the secure sites may refuse, if they found the suspicious connection from your computer. It is advised that you should work with your IT admin and then check that other apps or a firewall is not blocking the access. You should also contact with the IT admin to check that your organization is complying with Azure Active Directory configuration policies. Then, you should check your Windows credentials that it matches with your Office 365 credentials. Now, you should disable VPN client and also the browser VPN extensions just to establish a connection.

The above method will help you to solve <a href="https://bit.ly/3tpsBS9"><strong>Microsoft Team Sign in Errors</strong></a>. The executives of MS Office are always available for the user and they are well trained to solve your problem. If the user is still finding problem in solving the issue, then they can call the customer care of Microsoft Office through <a href="https://ms-office.us.com/"><strong>office.com/setup download the get free office key</strong></a>.

read here also....................................................

<a href="https://www.webroot-com-safe.com/"><strong>www.webroot.com/safe</strong></a>
<a href="http://www.avg-com-retail.support/"><strong>www.avg.com/retail</strong></a>

#ms office #microsoft team sign in errors #microsoft teams login problems #www.office.com/setup #office.com/setup #www office com setup