Exploiting Microsoft Teams Impersonation and Spoofing Vulner... #1552
+129
−2
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Post focus
Check Point Research dissected four Microsoft Teams impersonation/spoofing vulnerabilities that let external guests or malicious insiders manipulate trust signals across chats, notifications, and calls. Microsoft addressed all issues by October 2025; the notification-spoofing bug is tracked as CVE-2024-38197 (initially noted in Teams for iOS). Impact spans executive impersonation, BEC-style fraud, malware delivery, misinformation, privacy breaches, and disruption of ...
🔧 Technical Details
Unlabeled message edits by reusing clientmessageid: If a chat system correlates messages by a client-supplied ID, send a new message reusing the original
clientmessageid(e.g.,2711247313308716623) with differentcontent. The UI may render the replacement without an "Edited" marker. Use response metadata likeOriginalArrivalTimeto reference or time-align edits.Notification impersonation via display-name fields: Where notifications render a sender string sourced from payload fields (e.g.,
imdisplaynameor similar "from" attributes), set it to a high-trust identity (e.g., “CEO”). Clients that don’t canonicalize/validate this will show a forged sender, driving high click-through and compliance (CVE-2024-38197).1:1 chat relabeling by abusing group-topic endpoints: If a platform exposes a thread-topic property endpoint for group chats (e.g.,
PUT .../threads/<ConversationID>/pr...🤖 Agent ActionsI analyzed the blog and HackTricks repo, searched for existing content on Microsoft Teams/message-based phishing techniques, and confirmed there was no dedicated coverage. I created a new concise, highly technical page under Phishing Methodology and linked it from the Phishing Methodology README.
What I added/changed:
New page: src/generic-methodologies-and-resources/phishing-methodology/microsoft-teams-impersonation-spoofing.md
Linked the new page from Phishing Methodology README:
src/generic-methodologies-and-resources/phishing-methodology/README.md
No other sections were modified and no redundant content was added.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).