Since its launch back in March 2017 many had hypothesised about the zero-day vulnerabilities in Microsoft Teams and how hackers may use these exploits to their benefit. Inevitably all computer software has zero-day vulnerabilities, these are basically either known about, but there isn’t currently a patch to repair the doorway in as yet, or it is an unknown vulnerability, basically the software developer will only be made aware of that vulnerability when a hacker has either breached or attempted to breach that doorway in, but what many didn’t hypothesis about at the time was the means in which hackers did actually end up infiltrating the software, instead of zero-day attacks the hackers used the oldest tricks in the book, phishing emails and hacking email accounts directly.
Last year in early to mid 2021 it had been reported that there was a vast increase in the number of hacked email accounts and phishing emails that came from either a fake email account posing as a company employee or client, or came directly from that individual’s email account. Once the account was compromised the hacker had full rein to every email, document, etc., in that account as well as infiltrating Microsoft Teams sending malware to other users who thought their client or colleague had sent them something important, as well as giving the hacker the ability to steal Microsoft 365 login credentials, but in many instances most of the individuals, businesses affected and their IT support companies were not made aware of the hack until many weeks and months later when something finally brought their attention to the attack, like money going missing from their accounts. I’m not going to lie, it’s invariably difficult to know if a hacker has just sent you a phishing email if that email came from your colleagues email address written in their usual tone, on a topic you’ve both just been discussing.