The Register: If you dread a Microsoft Teams invite, just wait until it turns out to be a Russian phish

Source URL: https://www.theregister.com/2025/02/15/russia_spies_spoofing_teams/
Source: The Register
Title: If you dread a Microsoft Teams invite, just wait until it turns out to be a Russian phish

Feedly Summary: Roses aren’t cheap, violets are dear, now all your access token are belong to Vladimir
Digital thieves – quite possibly Kremlin-linked baddies – have been emailing out bogus Microsoft Teams meeting invites to trick victims in key government and business sectors into handing over their authentication tokens, granting access to emails, cloud data, and other sensitive information.…

AI Summary and Description: Yes

Summary: The text details a sophisticated phishing attack attributed to the Storm-2372 group, linked to Russian state interests, that exploits Microsoft Teams meeting invites to steal authentication tokens. This attack leverages device code phishing to gain unauthorized access to sensitive information, highlighting significant risks for government and enterprise sectors in various regions.

Detailed Description: The provided text outlines a pervasive phishing campaign known as device code phishing, executed by hackers associated with the Kremlin, specifically the Storm-2372 group. The attack has implications for information security across a range of sectors including government, IT services, telecommunications, and energy.

Key Points of the Attack:
– **Target Audience**: Storm-2372 has focused on high-value sectors such as government, NGOs, IT services, telecommunications, health, higher education, and energy across multiple regions including Europe, North America, Africa, and the Middle East.

– **Attack Methodology**:
– **Initial Contact**: The attackers create a false rapport with victims using messaging platforms like WhatsApp, Signal, and Microsoft Teams.
– **Phishing Emails**: They send spoofed Microsoft Teams meeting invites to victims, which lead them to a legitimate Microsoft login page.
– **Device Code Exploitation**: Victims are tricked into entering a device verification code previously requested by the attackers. This step allows attackers to acquire a valid access token to the victim’s account.

– **Lateral Movement**: Once access is gained, attackers can move laterally within the compromised network, potentially sending further phishing messages to other users.

– **Data Exfiltration**: Microsoft noted that Storm-2372 utilized Microsoft Graph to search for sensitive information in users’ emails, looking for keywords related to credentials and sensitive data.

– **Preventive Measures**: Users are advised to:
– Minimize the use of device code flows unless absolutely necessary.
– Revoke refresh tokens if device code phishing is suspected.
– Implement conditional access policies to enforce re-authentication for users.

This case highlights the importance of cybersecurity awareness and the need for robust security practices, particularly for organizations in sensitive sectors that are prime targets for sophisticated cyber threats. It’s a reminder of how attackers leverage social engineering and phishing techniques combined with legitimate platforms to breach security, emphasizing the necessity for continuous monitoring and education around such threats in the information security landscape.