DeFi Daily News
Monday, March 23, 2026
Advertisement
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • DeFi-IRA
  • DeFi
    • NFT
    • Metaverse
    • Web 3
  • Finance
    • Business Finance
    • Personal Finance
  • Markets
    • Crypto Market
    • Stock Market
    • Analysis
  • Other News
    • World & US
    • Politics
    • Entertainment
    • Tech
    • Sports
    • Health
  • Videos
No Result
View All Result
DeFi Daily News
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • DeFi-IRA
  • DeFi
    • NFT
    • Metaverse
    • Web 3
  • Finance
    • Business Finance
    • Personal Finance
  • Markets
    • Crypto Market
    • Stock Market
    • Analysis
  • Other News
    • World & US
    • Politics
    • Entertainment
    • Tech
    • Sports
    • Health
  • Videos
No Result
View All Result
DeFi Daily News
No Result
View All Result
Home DeFi Metaverse

rewrite this title From Teams to Inbox: Researchers Uncover Phishing Bypassing Email Security

Kristian McCann by Kristian McCann
January 29, 2026
in Metaverse
0 0
0
rewrite this title From Teams to Inbox: Researchers Uncover Phishing Bypassing Email Security
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on Telegram
Listen to this article


rewrite this content using a minimum of 1000 words and keep HTML tags

A wide-scale phishing operation is weaponizing Microsoft Teams to circumvent traditional email security defenses, according to new research from Check Point.

The campaign has already delivered more than 12,000 malicious emails targeting over 6,000 users across multiple industries. Unlike conventional phishing attempts that rely on malicious links or suspicious attachments, these attackers are exploiting legitimate Microsoft Teams features, specifically the platform’s guest invitation system, to impersonate billing alerts and deceive victims into contacting fraudulent support lines.

The sophistication of this operation is significant. By abusing built-in collaboration tools rather than external threats, attackers are effectively turning trusted business infrastructure against itself.

The attack methodology signals a broader shift in how cybercriminals approach corporate environments in an era where collaboration platforms have become essential business tools.

Exploiting Email Trust Through Teams

The attack unfolds through a carefully orchestrated sequence that leverages Microsoft Teams’ native functionality.

Attackers begin by creating a new team within the platform, assigning it a finance-themed name crafted to trigger urgency and concern.

Check Point researchers documented one example that read: “Subscription Auto-Pay Notice (Invoice ID: 2025_614632PPOT_SAG Amount at least 629.98 USD). If you did not authorize or complete this monthly payment, please contact our support team urgently.”

The sophistication lies in the obfuscation techniques embedded within these team names. Attackers deploy character substitutions (replacing “o” with “0” and “e” with “3”) alongside mixed Unicode characters and visually similar glyphs designed to evade automated detection systems. These subtle manipulations allow malicious content to slip past security filters that might otherwise flag suspicious patterns yet still appear normal to human users.

Once the team is established, attackers exploit the “Invite a Guest” feature, which triggers official-looking Microsoft emails sent directly to targets’ inboxes. This mechanism allows the attack to reach users without traditional phishing techniques like malware-loaded attachments or links. The invitation emails originate from legitimate Microsoft servers, carrying authentic Microsoft branding and headers that would pass most email authentication checks.

The final stage directs victims to call a fraudulent support number to resolve the fabricated billing issue. During these calls, attackers attempt to extract login credentials, multi-factor authentication codes, or other sensitive information that can be used to access corporate email accounts and internal systems.

The combination of official Microsoft messaging, urgent finance-related language, and the absence of links creates a heightened level of trust, making standard firewall protections less effective and leaving user vigilance as the main line of defense.

The Growing Threat Landscape: Teams as an Attack Vector

Microsoft Teams and similar collaboration platforms have increasingly become preferred targets for cybercriminals seeking to exploit trusted communication channels.

Earlier this month, Westminster City Council advised staff to exercise heightened vigilance when using Microsoft Teams following a major cyberattack. Employees were specifically instructed to avoid accepting calls from unknown contacts or unexpected meeting invitations, a clear indication that Teams-based threats have reached a threshold requiring organizational policy changes.

This Westminster incident, while not following the exact methodology described in the Check Point research, underscores a troubling trend: the normalization of collaboration platforms as legitimate attack surfaces.

The Scattered Spider hacking group, active since 2022, has used similarly audacious tactics within this domain. These sophisticated operators have impersonated legitimate employees to manipulate IT teams into resetting passwords or transferring multi-factor authentication tokens through both Microsoft Teams and Slack. Their operations represent the apex of social engineering sophistication.

This represents a fundamental shift in attacker methodology. Rather than attempting to breach perimeters through technical exploits or convincing users to interact with malware, these campaigns target the human element directly through communications to extract information, bypassing much of the security inherent in both UC systems and email.

This shift can be attributed to Microsoft tightening controls on suspicious links and attachments that hackers previously used to inject malware into user environments.

Adapting Security Postures for Collaboration-Platform Threats

The Check Point research found that victims were concentrated in the United States, accounting for nearly 68% of incidents. Europe followed with approximately 16%, Asia with 6%, and smaller shares in Australia, New Zealand, Canada, and several Latin American countries.

Educational organizations represented one in eight victims, followed by professional services at 11%, government at 8%, finance at 7%, and manufacturing as a key target.

Organizations must recognize that even strengthening malware security or firewalls is not an antidote to this current wave of attacks.

Security awareness training must evolve to include specific guidance on the risks of sharing information with impersonators.

Users should treat any unexpected Microsoft invitations with caution, especially if team names include payment amounts, invoices, phone numbers, or unusual formatting.

As UC platforms continue their expansion into core business operations, they will increasingly serve as tools for legitimate business collaboration and avenues for attacker coordination.

and include conclusion section that’s entertaining to read. do not include the title. Add a hyperlink to this website http://defi-daily.com and label it “DeFi Daily News” for more trending news articles like this



Source link

Tags: BypassingEmailinboxPhishingResearchersrewritesecurityTeamstitleUncover
ShareTweetShare
Previous Post

How Do I Prepare For My Husband To Go To Prison?

Next Post

rewrite this title Morning Minute: Gold Soars Toward $5,600; Bitcoin Falls – Decrypt

Next Post
rewrite this title Morning Minute: Gold Soars Toward ,600; Bitcoin Falls – Decrypt

rewrite this title Morning Minute: Gold Soars Toward $5,600; Bitcoin Falls - Decrypt

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

No Result
View All Result
  • Trending
  • Comments
  • Latest
rewrite this title Critics Mock Anthropic’s Claims Chinese AI Labs Are Stealing Its Data – Decrypt

rewrite this title Critics Mock Anthropic’s Claims Chinese AI Labs Are Stealing Its Data – Decrypt

February 23, 2026
rewrite this title Google Unveils Flow: An All-in-One AI Video Editing Tool That Can Do It All!

rewrite this title Google Unveils Flow: An All-in-One AI Video Editing Tool That Can Do It All!

May 21, 2025
rewrite this title and make it good for SEO Kite (KITE) Will Be Listed on Binance HODLer Airdrops!

rewrite this title and make it good for SEO Kite (KITE) Will Be Listed on Binance HODLer Airdrops!

November 1, 2025
President Trump nominates Kevin Warsh for Fed chair, top takeaways from Apple’s big earnings beat

President Trump nominates Kevin Warsh for Fed chair, top takeaways from Apple’s big earnings beat

January 30, 2026
rewrite this title How to Get Top Solana Token Holders – Moralis APIs

rewrite this title How to Get Top Solana Token Holders – Moralis APIs

May 14, 2025
Wintermute Integrates Over 350 Cryptocurrency Pairs with Traditional Finance through oneZero Collaboration | Coin Media

Wintermute Integrates Over 350 Cryptocurrency Pairs with Traditional Finance through oneZero Collaboration | Coin Media

July 16, 2024
rewrite this title Deadspin | Deep-shooting Alabama overwhelms Texas Tech, moves on to Sweet 16

rewrite this title Deadspin | Deep-shooting Alabama overwhelms Texas Tech, moves on to Sweet 16

March 23, 2026
rewrite this title Details emerge on major WWE star’s punishment; fine amount revealed – Reports

rewrite this title Details emerge on major WWE star’s punishment; fine amount revealed – Reports

March 22, 2026
rewrite this title Bitcoin Price Slides but Holds Up Better Than Stocks as Oil Shock Continues – Decrypt

rewrite this title Bitcoin Price Slides but Holds Up Better Than Stocks as Oil Shock Continues – Decrypt

March 22, 2026
rewrite this title Samsung's Galaxy S26 Phones Will Work With Apple's AirDrop, Much Like the Pixel 10

rewrite this title Samsung's Galaxy S26 Phones Will Work With Apple's AirDrop, Much Like the Pixel 10

March 22, 2026
rewrite this title and make it good for SEOHow Many Fed Rate Cuts Can We Now Expect in 2026?

rewrite this title and make it good for SEOHow Many Fed Rate Cuts Can We Now Expect in 2026?

March 22, 2026
rewrite this title World Athletics Indoor Championships: British trio Keely Hodgkinson, Georgia Hunter Bell and Molly Caudery all win gold

rewrite this title World Athletics Indoor Championships: British trio Keely Hodgkinson, Georgia Hunter Bell and Molly Caudery all win gold

March 22, 2026
DeFi Daily

Stay updated with DeFi Daily, your trusted source for the latest news, insights, and analysis in finance and cryptocurrency. Explore breaking news, expert analysis, market data, and educational resources to navigate the world of decentralized finance.

  • About Us
  • Blogs
  • DeFi-IRA | Learn More.
  • Advertise with Us
  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2024 Defi Daily.
Defi Daily is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • DeFi-IRA
  • DeFi
    • NFT
    • Metaverse
    • Web 3
  • Finance
    • Business Finance
    • Personal Finance
  • Markets
    • Crypto Market
    • Stock Market
    • Analysis
  • Other News
    • World & US
    • Politics
    • Entertainment
    • Tech
    • Sports
    • Health
  • Videos

Copyright © 2024 Defi Daily.
Defi Daily is not responsible for the content of external sites.