Microsoft Teams has been storing authentication tokens in plaintext | Tech Reader

Date:

Share:


Microsoft Teams stores authentication tokens in unencrypted plaintext mode, allowing attackers to potentially control communications within an organization, according to the security firm Vectra. The flaw affects the desktop app for Windows, Mac and Linux built using Microsoft’s Electron framework. Microsoft is aware of the issue but said it has no plans for a fix anytime soon, since an exploit would also require network access.

According to Vectra, a hacker with local or remote system access could steal the credentials for any Teams user currently online, then impersonate them even when they’re offline. They could also pretend to be the user through apps associated with Teams, like Skype or Outlook, while bypassing the multifactor authentication (MFA) usually required. 

“This enables attackers to modify SharePoint files, Outlook mail and calendars, and Teams chat files,” Vectra security architect Connor Peoples wrote. “Even more damaging, attackers can tamper with legitimate communications within an organization by selectively destroying, exfiltrating, or engaging in targeted phishing attacks.”

Attackers can tamper with legitimate communications within an organization by selectively destroying, exfiltrating, or engaging in targeted phishing attacks.

Vectra created a proof-of-concept exploit that allowed them to send a message to the account of the credential holder via an access token. “Assuming full control of critical seats–like a company’s Head of Engineering, CEO, or CFO — attackers can convince users to perform tasks damaging to the organization.”  

The problem is mainly limited to the desktop app, because the Electron framework (that essentially creates a web app port) has “no additional security controls to protect cookie data,” unlike modern web browsers. As such, Vectra recommends not using the desktop app until a patch is created, and using the web application instead.

When informed by cybersecurity news site Dark Reading of the vulnerability, Microsoft said it “does not meet our bar for immediate servicing as it requires an attacker to first gain access to a target network,” adding that it would consider addressing it in a future product release. 

However, threat hunter John Bambenek told Dark Reading it could provide a secondary means for “lateral movement” in the event of a network breach. He also noted that Microsoft is moving toward Progressive Web Apps that “would mitigate many of the concerns currently brought by Electron.”

All products recommended by Tech Reader are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission. All prices are correct at the time of publishing.



Source link

━ more like this

The Fragility of Reputation: Why It Takes Years to Build and Moments to Destroy – Insights Success

Reputation in our fast-paced world is everything. Whether it’s an individual or a business or a person, the perception that people gain from...

An entirely new line of Macs may launch in just a few weeks | Tech Reader

Apple’s iPhone 16 event was totally devoid of new Macs, and there were some good reasons for that. One of them is that...

This one thing is holding back the iPhone 16 | Tech Reader

Apple recently announced some new iPhones — perhaps you’ve already heard? The iPhone 16 family is upon us, and it’s an interesting mix...

Shogun and The Bear win big for Disney at the Emmys

The second Emmys of 2024 have come and gone, with streamers once again winning big for some of our favorite television shows. Disney...

Flappy Bird’s creator wants you to know he’s got nothing to do with the new version

A decade ago, Flappy Bird became a sensation among smartphone users, with many of us spending far too long getting the little yellow...
spot_img