{"id":3497,"date":"2020-12-14T08:48:29","date_gmt":"2020-12-14T07:48:29","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3497"},"modified":"2023-12-07T13:28:56","modified_gmt":"2023-12-07T12:28:56","slug":"new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/","title":{"rendered":"New Microsoft Teams flaw is a big security concern &#8211; then what has gone wrong, Microsoft?"},"content":{"rendered":"\n<p>The nature of the flaw in Microsoft Teams allows performing an attack in which the recipient of a message does not need to perform any sort of action \u2013 exploitation will occur just by reading it. And what comes as a real surprise is a fact that the zero-click remote code execution vulnerability did not receive a CVE. Considering how many companies rely on MS Teams as a collaboration software, it is extremely important that organizations prioritize patching this vulnerability. And not giving it a CVE sends a bad message.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"watch-out-for-zeroclick-wormable-flaw-in-microsoft-teams\"><strong>Watch out for zero-click, wormable flaw in Microsoft Teams<\/strong><\/h2>\n\n\n<p>Security engineer, Oskars Vegeris from Evolution Gaming disclosed technical details about a wormable, cross-platform bug in Microsoft Teams that could allow stealth attacks.<\/p>\n\n\n\n<p>The flaw is a cross-site scripting (XSS) issue that impacts the \u2018teams.microsoft.com\u2019 domain. It could be exploited by an attacker to achieve remote code execution in the MS Teams desktop app.<\/p>\n\n\n\n<p>A crook could exploit the flaw by sending a specially crafted message to any Microsoft Teams user or channel which will execute arbitrary code on victim PC\u2019s with NO USER INTERACTION.<\/p>\n\n\n\n<p>Remote Code Execution has been achieved in desktop applications across all supported platforms (Windows, macOS, Linux). It gives attackers full access to victim devices and company internal networks via those devices<\/p>\n\n\n\n<p>Even without gaining arbitrary code execution, the attacker could exploit the XSS flaw to obtain SSO authorization tokens for MS Teams or other Microsoft services (e.g. Skype, Outlook, Office365). The issue could also allow attackers to access confidential conversations and files from the communications service.<\/p>\n\n\n\n<p>The researcher pointed out that the attack is stealth so it doesn\u2019t require any user interaction and there are no indicators of compromise for this attack. The flaw is also \u2018wormable,\u2019 this means that it is possible to automatically repost the exploit payload to other companies, channels, users without interaction<\/p>\n\n\n\n<p>Successful exploitation could cause complete loss of confidentiality and integrity for end-users, attackers could access sensitive info into private chats, files, internal network, along with private keys and personal data outside MS Teams<\/p>\n\n\n\n<p>Unfortunately, IT giant rated the issue \u201cImportant, Spoofing\u201d which is one og the lowest in-scope ratings possible. Wouldn\u2019t even issue a CVE number for the vulnerability, because issues in Microsoft Teams are fixed via automatic updates.<\/p>\n\n\n\n<p>If you want 100% warranty that your SaaS data is protected, consider <a href=\"https:\/\/xopero.com\/solutions\/data-protection\/backup-microsoft-office-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">Office 365 backup<\/a> and even today join <a href=\"https:\/\/xopero.com\/xopero-beta-testing-community\/\" target=\"_blank\" rel=\"noreferrer noopener\">Xopero Beta Testing Community<\/a>.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/securityaffairs.co\/wordpress\/112062\/hacking\/microsoft-teams-wormable-flaw.html\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"amnesia33-vulnerabilities-affect-millions-of-iot-devices\"><strong>Amnesia:33 vulnerabilities affect millions of IoT devices<\/strong><\/h2>\n\n\n<p>A new set of serious vulnerabilities affecting TCP\/IP stacks has been discovered impacting millions of routers and IoT and OT devices from more than 150 vendors.<\/p>\n\n\n\n<p>Most of the flaws stem from memory corruption \u2013 hence the \u201eAmnesia:33\u201d name. The 33 vulnerabilities &#8211; four of which are critical &#8211; could enable a range of malicious attacks:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Remote code execution (RCE) to take control of a target device.<\/li><li>Denial of service (DoS) to impair functionality and impact business operations.<\/li><li>Information leak (infoleak) to acquire potentially sensitive information.<\/li><li>DNS cache poisoning attacks to point a device to a malicious website.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"What is AMNESIA:33?\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/AM21YSuK78w?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>The flaws are found in four (out of seven analyzed) TCP\/IP stacks (including uIP, picoTCP, FNET and Nut\/Net), which are a set of communication protocols used by internet-connected devices. Because multiple open-source TCP\/IP stacks are affected, which are not owned by a single company, it presents tough patch management challenges for Amnesia:33.&nbsp;<\/p>\n\n\n\n<p>TCP\/IP issues have previously been found with related vulnerability sets, <a href=\"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/\">Ripple20<\/a> and Urgent\/11.<\/p>\n\n\n\n<p>Exploiting these vulnerabilities could allow an attacker to take control of a device, thus using it as an entry point on a network (for internet-connected devices), as a pivot point for lateral movement, as a persistence point on the target network or as the final target of an attack.<\/p>\n\n\n\n<p>However, exploiting any devices using one of the Amnesia:33 bugs depends on which devices a company uses and where the devices are deployed across its network. For example, routers can be exploited remotely, as they are usually connected to a company&#8217;s external interface. Other devices, like sensors and industrial equipment, might require that attackers gain access to a company&#8217;s internal network first.<\/p>\n\n\n\n<p>In terms of mitigation, researchers recommend various coursees of action in protecting networks from the Amnesia:33 flaws, including disabling or blocking IPv6 traffic when it\u2019s not necessary; configuring devices to rely on internal DNS servers as much as possible; and monitoring all network traffic for malformed packets that try to exploit known flaws.<\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.zdnet.com\/article\/amnesia33-vulnerabilities-impact-millions-of-smart-and-industrial-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">1<\/a> |&nbsp;<a href=\"https:\/\/threatpost.com\/amnesia33-tcp-ip-flaws-iot-devices\/161928\/\" target=\"_blank\" rel=\"noreferrer noopener\">2<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"free-cyberpunk-2077-downloads-lead-to-data-harvesting\"><strong>\u2018Free\u2019 Cyberpunk 2077 downloads lead to data harvesting<\/strong><\/h2>\n\n\n<p>It was pretty obvious that the hotly anticipated game featuring a digital Keanu Reeves as a major character is going to be used as a lure for cyberattacks. Cyberpunk 2077 officially came out on Dec. 10 and immediately broke the bank &#8211; at the peak moment at night there were over 1 million gamers playing it on Steam. Cybercriminals came in, looking to cash in on the excitement, with scams that offer \u201cfree copies\u201d while stealing personal information.<\/p>\n\n\n\n<p>According to researchers at Kaspersky, a series of websites have gone live in a range of languages, all with URLs containing keywords like \u201cPC\u201d, \u201cgames\u201d and \u201cdownload.\u201d And they all offer free purported downloads for the game.<\/p>\n\n\n\n<p>\u201cIf the visitor clicks the [download] button, the site downloads an executable file that appears to be an installer to the computer,\u201d researchers noted in a Monday posting. \u201cOpening it, the user sees a menu with some inactive buttons, creating the illusion that, once installed, the app can be used to run and configure the game.\u201d<\/p>\n\n\n\n<p>This menu offers three options: Install, Support and Exit. Clicking Install opens a window that pretends to be installing the game \u2013 and it eventually asks for a license key. Obviously the target won\u2019t have said key, so the process offers a convenient \u201cGet License Key\u201d button.<\/p>\n\n\n\n<p>Clicking this button directs users to a website that offers the user a chance to take a survey or enter a giveaway to get the key.<\/p>\n\n\n\n<p>\u201cThe next prompt is a set of unrelated questions, as well as requests for a phone number and email address,\u201d according to Kaspersky. \u201cThat contact information is the likely target of the attack; contact information is useful for spamming.\u201d<\/p>\n\n\n\n<p>Once victims complete the survey, they receive a supposed \u201ckey\u201d which, when entered into the fake installer, appears to start loading the game, researchers said. The fake progress is then impaired though, with a splash screen that says users are missing a dynamic link library (DLL) required to run the game. Another download link is presented, which again redirects to a survey page \u2013 and that\u2019s where the gambit ends.<\/p>\n\n\n\n<p>Similar schemes can be more dangerous &#8211; cybercriminals could ask for money in exchange for the key. Or they could use the same routine to install malware.<\/p>\n\n\n\n<p>This year there was several thousand infections attempts through fake Cyberpunk 2077 downloads.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/free-cyberpunk-2077-downloads\/161963\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"hackers-hide-web-skimmer-inside-a-websites-css-files\"><strong>Hackers hide web skimmer inside a website&#8217;s CSS files<\/strong><\/h2>\n\n\n<p>Over the years, cybercrime groups have used quite an assortment of tricks to hide credit card stealing code inside various locations of an online store for the purpose of avoiding getting detected.<\/p>\n\n\n\n<p>Places where web skimmers have been found in the past include inside images such as those used for site logos, favicons, and social media networks; appended to popular JavaScript libraries like jQuery, Modernizr, and Google Tag Manager; or hidden inside site widgets like live chat windows.<\/p>\n\n\n\n<p>The latest of these odd places is CSS files. How exactly? One of the recent additions to the CSS language was a feature that would allow it to load and run JavaScript code from within a CSS rule. And this CSS feature is now being abused by web skimmer gangs.<\/p>\n\n\n\n<p>But while this technique of loading skimmer code by using CSS rules as proxies is certainly innovative, this is not what shop owners and online shoppers should be worried about. The majority of skimming attacks happen on the server, where it is completely invisible. About 65% of our forensic investigations this year found a server side skimmer that was hidden in the database, PHP code or a Linux system process. The simplest way shoppers can protect themselves and their customers from web skimmer attacks is to use virtual cards designed for one-time payments.<\/p>\n\n\n\n<p>Virtual cards allow shoppers to place a fixed sum of money inside a virtual debit card that expires after one transaction or a small period of time. In case the card&#8217;s details get stolen by attackers, the card data is useless once the virtual card expires.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/hackers-hide-web-skimmer-inside-a-websites-css-files\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Critical remote code execution fixed in PlayStation Now (<a href=\"https:\/\/securityaffairs.co\/wordpress\/112049\/hacking\/playstation-now-rce.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security Affairs<\/a>)<br>2. D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws (<a href=\"https:\/\/threatpost.com\/d-link-routers-zero-day-flaws\/162064\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>3. Adrozek malware silently inject ads into search results in multiple browsers (<a href=\"https:\/\/securityaffairs.co\/wordpress\/112166\/malware\/adrozek-malware-campaign.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security Affairs<\/a>)<br>4. Cybersecurity Firm FireEye Got Hacked; Red-Team Pentest Tools Stolen (<a href=\"https:\/\/thehackernews.com\/2020\/12\/cybersecurity-firm-fireeye-got-hacked.html\" target=\"_blank\" rel=\"noreferrer noopener\">The Hacker News<\/a>)<strong><br><\/strong>5. Phishers bypass Microsoft 365 security controls by spoofing Microsoft.com (<a href=\"https:\/\/www.helpnetsecurity.com\/2020\/12\/10\/bypass-microsoft-365-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">HelpNetSecurity<\/a>)<br>6. Google Patches Critical Wi-Fi and Audio Bugs in Android Handsets (<a href=\"https:\/\/threatpost.com\/google-patches-critical-wi-fi-and-audio-bugs-in-android-handsets\/162060\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>7. Researcher Developed New Kernel-Level Exploits for Old Vulns in Windows (<a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/researcher-developed-new-kernel-level-exploits-for-old-vulns-in-windows-\/d\/d-id\/1339668\" target=\"_blank\" rel=\"noreferrer noopener\">Dark Reading<\/a>)<br>8. Qbot malware switched to stealthy new Windows autostart method (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/qbot-malware-switched-to-stealthy-new-windows-autostart-method\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>9. Hackers are selling more than 85,000 SQL databases on a dark web portal (<a href=\"https:\/\/www.zdnet.com\/article\/hackers-are-selling-more-than-85000-sql-databases-on-a-dark-web-portal\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>10. Russian hackers hide Zebrocy malware in virtual disk images (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/russian-hackers-hide-zebrocy-malware-in-virtual-disk-images\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The nature of the flaw in Microsoft Teams allows performing an attack in which the recipient of a message does not need to perform any sort of action \u2013 exploitation will occur just by reading it. And what comes as a real surprise is a fact that the zero-click remote code execution vulnerability did not receive a CVE. Considering how many companies rely on MS Teams as a collaboration software, it is extremely important that organizations prioritize patching this vulnerability. And not giving it a CVE sends a bad message.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-3497","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Microsoft Teams flaw is a big security concern<\/title>\n<meta name=\"description\" content=\"The nature of the flaw in Microsoft Teams allows performing an attack in which the recipient of a message does not need to perform any sort of action.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Microsoft Teams flaw is a big security concern\" \/>\n<meta property=\"og:description\" content=\"The nature of the flaw in Microsoft Teams allows performing an attack in which the recipient of a message does not need to perform any sort of action.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-14T07:48:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-07T12:28:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"New Microsoft Teams flaw is a big security concern &#8211; then what has gone wrong, Microsoft?\",\"datePublished\":\"2020-12-14T07:48:29+00:00\",\"dateModified\":\"2023-12-07T12:28:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/\"},\"wordCount\":1572,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/\",\"name\":\"New Microsoft Teams flaw is a big security concern\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-12-14T07:48:29+00:00\",\"dateModified\":\"2023-12-07T12:28:56+00:00\",\"description\":\"The nature of the flaw in Microsoft Teams allows performing an attack in which the recipient of a message does not need to perform any sort of action.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Microsoft Teams flaw is a big security concern &#8211; then what has gone wrong, Microsoft?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Microsoft Teams flaw is a big security concern","description":"The nature of the flaw in Microsoft Teams allows performing an attack in which the recipient of a message does not need to perform any sort of action.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/","og_locale":"pl_PL","og_type":"article","og_title":"New Microsoft Teams flaw is a big security concern","og_description":"The nature of the flaw in Microsoft Teams allows performing an attack in which the recipient of a message does not need to perform any sort of action.","og_url":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-12-14T07:48:29+00:00","article_modified_time":"2023-12-07T12:28:56+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"7 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"New Microsoft Teams flaw is a big security concern &#8211; then what has gone wrong, Microsoft?","datePublished":"2020-12-14T07:48:29+00:00","dateModified":"2023-12-07T12:28:56+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/"},"wordCount":1572,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/","url":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/","name":"New Microsoft Teams flaw is a big security concern","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-12-14T07:48:29+00:00","dateModified":"2023-12-07T12:28:56+00:00","description":"The nature of the flaw in Microsoft Teams allows performing an attack in which the recipient of a message does not need to perform any sort of action.","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/new-microsoft-teams-flaw-is-a-big-security-concern-then-what-has-gone-wrong-microsoft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"New Microsoft Teams flaw is a big security concern &#8211; then what has gone wrong, Microsoft?"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3497"}],"version-history":[{"count":9,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3497\/revisions"}],"predecessor-version":[{"id":5412,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3497\/revisions\/5412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}