{"id":1578,"date":"2020-04-29T13:18:00","date_gmt":"2020-04-29T13:18:00","guid":{"rendered":"https:\/\/cisobyte.com\/?p=1578"},"modified":"2020-04-29T22:13:37","modified_gmt":"2020-04-29T22:13:37","slug":"update-teams-today-to-avoid-malicious-gifs","status":"publish","type":"post","link":"https:\/\/cisobyte.com\/index.php\/2020\/04\/29\/update-teams-today-to-avoid-malicious-gifs\/","title":{"rendered":"Update Teams Today to Avoid Malicious GIFs"},"content":{"rendered":"<h4 style=\"text-align: left;\"><strong>CISObyte&nbsp; &nbsp; 04-29-2020<\/strong><\/h4>\n<p><\/p>\n<h4>A vulnerability involving compromised subdomain hosting malicious GIFs has been patched in Microsoft Teams.<\/h4>\n<h2>&#8220;All a user had to do was view the GIF to allow an attacker to scrape data from their account.&#8221;<\/h2>\n<p>I&#8217;ll go on forever preaching Patch Management, it may be the most banal task, but it is also one of the most important functions in establishing a hardened security posture.&nbsp; &#8220;As more and more business is conducted from remote locations, attackers are focusing their efforts on exploiting the key technologies \u2013 like Zoom and Microsoft Teams \u2013 that companies and their employees depend on to stay connected.&#8221; &#8220;The amount of data that goes into these applications is enormous and often includes confidential information from user names and passwords to top-secret business information \u2013 making them prime targets for attackers.&#8221; &#8220;While limiting your organization to internal communication will reduce your exposure, we found that it is still possible to communicate with an outsider and any interaction that includes a chat interface with an outsider is enough to be affected by this vulnerability.&#8221; &#8220;The victim sees a regular GIF sent to them \u2013- that\u2019s it!&#8221; &#8220;The victim will never know that they\u2019ve been attacked, making the exploitation of this vulnerability stealthy and dangerous.&#8221;<\/p>\n<ul>\n<li>Vulnerability Management<\/li>\n<li>Microsoft<\/li>\n<li>Teams<\/li>\n<li>Patch Management<\/li>\n<\/ul>\n<div class=\"vlp-link-container vlp-template-default \">\n\t<a href=\"https:\/\/www.cyberark.com\/threat-research-blog\/beware-of-the-gif-account-takeover-vulnerability-in-microsoft-teams\/\" class=\"vlp-link\" title=\"Cyberark - Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams | CyberArk\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/Conference-Call-1024x683.jpg\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tCyberark - Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams | CyberArk\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\tBeware of the GIF: Account Takeover Vulnerability in Microsoft Teams<br \/>\nAs more and more business is conducted from remote locations, attackers are focusing their efforts on exploiting the key technologies \u2013 like Zoom and Microsoft Teams \u2013 that companies and their employees depend on to stay connected.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>04-29-2020 | A vulnerability involving compromised subdomain hosting malicious GIFs has been patched in Microsoft Teams.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[29,22],"tags":[30,28,31,13],"class_list":["post-1578","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-vulnerability-management","tag-microsoft","tag-patch-management","tag-teams","tag-vulnerability-management"],"_links":{"self":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/comments?post=1578"}],"version-history":[{"count":3,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1578\/revisions"}],"predecessor-version":[{"id":1624,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1578\/revisions\/1624"}],"wp:attachment":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/media?parent=1578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/categories?post=1578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/tags?post=1578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}