Microsoft Teams has been storing authentication tokens in plaintext | Tech Reader

Date:

Share:


Microsoft Teams stores authentication tokens in unencrypted plaintext mode, allowing attackers to potentially control communications within an organization, according to the security firm Vectra. The flaw affects the desktop app for Windows, Mac and Linux built using Microsoft’s Electron framework. Microsoft is aware of the issue but said it has no plans for a fix anytime soon, since an exploit would also require network access.

According to Vectra, a hacker with local or remote system access could steal the credentials for any Teams user currently online, then impersonate them even when they’re offline. They could also pretend to be the user through apps associated with Teams, like Skype or Outlook, while bypassing the multifactor authentication (MFA) usually required. 

“This enables attackers to modify SharePoint files, Outlook mail and calendars, and Teams chat files,” Vectra security architect Connor Peoples wrote. “Even more damaging, attackers can tamper with legitimate communications within an organization by selectively destroying, exfiltrating, or engaging in targeted phishing attacks.”

Attackers can tamper with legitimate communications within an organization by selectively destroying, exfiltrating, or engaging in targeted phishing attacks.

Vectra created a proof-of-concept exploit that allowed them to send a message to the account of the credential holder via an access token. “Assuming full control of critical seats–like a company’s Head of Engineering, CEO, or CFO — attackers can convince users to perform tasks damaging to the organization.”  

The problem is mainly limited to the desktop app, because the Electron framework (that essentially creates a web app port) has “no additional security controls to protect cookie data,” unlike modern web browsers. As such, Vectra recommends not using the desktop app until a patch is created, and using the web application instead.

When informed by cybersecurity news site Dark Reading of the vulnerability, Microsoft said it “does not meet our bar for immediate servicing as it requires an attacker to first gain access to a target network,” adding that it would consider addressing it in a future product release. 

However, threat hunter John Bambenek told Dark Reading it could provide a secondary means for “lateral movement” in the event of a network breach. He also noted that Microsoft is moving toward Progressive Web Apps that “would mitigate many of the concerns currently brought by Electron.”

All products recommended by Tech Reader are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission. All prices are correct at the time of publishing.



Source link

━ more like this

NYT Strands today: hints, spangram and answers for Saturday, September 7 | Tech Reader

Strands is a brand new daily puzzle from the New York Times. A trickier take on the classic word search, you’ll need a...

NYT Connections: hints and answers for Saturday, September 7 | Tech Reader

Connections is the latest puzzle game from the New York Times. The game tasks you with categorizing a pool of 16 words into four...

NYT Mini Crossword today: puzzle answers for Friday, September 6

The NYT Mini crossword might be a lot smaller than a normal crossword, but it isn't easy. If you're stuck with today's crossword,...

Does Caller ID Mean Much in the Age of Spoofed Numbers? | TechRepublic

Caller ID is the name and number displayed when you receive a call. Your caller ID shows up when you call someone else. There’s...

3 underrated sci-fi movies on Amazon Freevee you should watch in September | Tech Reader

Looking for a good sci-fi movie to watch this month? It’s even better if you can find it streaming for free, right? One...
spot_img