By Rodman Ramezanian - Enterprise Cloud Security Advisor
May 19, 2022 7 Minute Read
Traditionally, hackers have focused their targets on Microsoft’s universal document and sharing suites – Office and its cloud-based Office 365 – with attacks against individual apps, such as Word, Excel, and others.
Now, thanks to its tremendous adoption surge since COVID-19 (much like many other SaaS applications), Microsoft Teams continues to be an exceedingly prevalent attack surface. As many organizations’ employees continue working remotely, the reliance on Microsoft Teams to collaborate is stronger than ever before. According to market insights from Statista, the number of daily active users of Teams nearly doubled from 2020 to 2021, with reports from Microsoft now claiming 270 million monthly active users as of January 2022.
With successful spear-phishing and business email compromise attacks being amplified by lackluster security authentication methods, threat actors gain access to corporate Microsoft 365 accounts that, in turn, grant them access to inter-organizational applications, chats, files, and directories.
From there, sending Trojan-loaded files via Teams chat messages take very little effort, and thus result in user execution. Unfortunately, disaster then ensues with the commandeering of the user’s system.
Spear-phishing and BEC attack vectors are nothing new (which does not excuse lenient security practices), and users are typically cautious of data received over email – thanks to internal email phishing awareness trainings. Most, however, tend to exhibit little caution or doubt about files received over a private and corporate chat platform; particularly with seemingly innocent attachments named “User Centric.” At that point, “the user is the weakest link” as the saying goes, and thus provides the threat actor with the foothold he/she needs to administer control of the system. Sadly, MS Teams’ limited native protections exacerbate these types of attacks.
With over 11 years’ worth of extensive cybersecurity industry experience, Rodman Ramezanian is an Enterprise Cloud Security Advisor, responsible for Technical Advisory, Enablement, Solution Design and Architecture at Skyhigh Security. In this role, Rodman primarily focuses on Australian Federal Government, Defense, and Enterprise organizations.
Rodman specializes in the areas of Adversarial Threat Intelligence, Cyber Crime, Data Protection, and Cloud Security. He is an Australian Signals Directorate (ASD)-endorsed IRAP Assessor – currently holding CISSP, CCSP, CISA, CDPSE, Microsoft Azure, and MITRE ATT&CK CTI certifications.
Candidly, Rodman has a strong passion for articulating complex matters in simple terms, helping the average person and new security professionals understand the what, why, and how of cybersecurity.