Microsoft patches Teams against image-based account takeover flaw
Malicious gifs that produced cookies could be used to access an entire organisation's accounts
Microsoft has moved fast to patch a vulnerability that let hackers take over Teams accounts simply by sharing malicious gifs.
The issue could have potentially affected every user that uses Microsoft Teams on desktop or in a web browser, according to CyberArk, which worked with the tech giant's security research centre.
The hack is essentially a subdomain takeover whereby attackers use a gif to scrape user data and gain control of an entire organisations' Teams accounts as it's shared through the service.
This is an exploit of the way Teams passes authentication access tokens to image resources. Every time a user opens the app a temporary token is created in the form of a JESON Web Token (JWT). These allow other users to see images shared with them or by them, as they are stored on a Microsoft server. A user only has to see the image for the attack to start spreading automatically.
This creates two cookies that allow hackers to make calls through the Teams APIs as well as have complete control over an account. This includes being able to read and send messages, create groups, add or remove participants and change permissions.
The only hurdle to the attack is that "authtoken" can only be used with a subdomain.
"If an attacker can somehow force a user to visit the sub-domains that have been taken over, the victim's browser will send this cookie to the attacker's server, and the attacker (after receiving the authtoken) can create a skype token," CyberArk explained in a blog post. "After doing all of this, the attacker can steal the victim's Teams account data"
Microsoft has patched the issue after being alerted to the threat via its vulnerability disclosure program. The tech giant deleted misconfigured DNS records that allowed the attackers to gain control of the subdomains.
BCDR buyer's guide for MSPs
How to choose a business continuity and disaster recovery solutionDownload now
The definitive guide to IT security
Protecting your MSP and your customersDownload now
Cost of a data breach report 2020
Find out what factors help mitigate breach costsDownload now
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now