Updated
Updated · CSO Online · Apr 20
Microsoft warns of cross-tenant social engineering attacks abusing Teams for data exfiltration
Updated
Updated · CSO Online · Apr 20

Microsoft warns of cross-tenant social engineering attacks abusing Teams for data exfiltration

5 articles · Updated · CSO Online · Apr 20
  • Attackers impersonate IT helpdesk staff via Teams’ external access, persuading employees to grant remote control and enabling stealthy data theft, Microsoft reports in new research.
  • These attacks exploit user trust within collaboration platforms, bypassing traditional phishing defenses by using legitimate tools and workflows, making detection difficult and blending into normal IT operations.
  • Experts urge organizations to tighten external access controls, integrate security monitoring across platforms, and improve user awareness, as collaboration tools increasingly become a target for sophisticated social engineering tactics.
As hackers impersonate IT on Teams, is disabling external access the only real defense?
With attacks exploiting Teams' core features, is the platform's design inherently insecure for collaboration?
How do token-based exploits like 'device code phishing' amplify these Teams-based social engineering campaigns?
If 'user-approved access' bypasses security, is the Zero Trust model failing social engineering?
With threat groups like UNC6692 on the rise, what is the next evolution of identity-based attacks?
Beyond training, how can workflows be redesigned to shield employees from psychological manipulation?