Microsoft has announced two critical security enhancements currently in development for Teams users worldwide.

Microsoft has announced two critical security enhancements currently in development for Teams users worldwide.

The first enhancement introduces sophisticated malicious URL detection capabilities that can identify and warn users about potentially harmful links shared in chats and channels. This real-time protection system provides an additional layer of defense against malware attacks that commonly exploit seemingly innocent web links.
New Command-and-Control (C2) method, Ghost Calls, uses Zoom and Teams TURN servers to tunnel malicious traffic undetected.

New Command-and-Control (C2) method, Ghost Calls, uses Zoom and Teams TURN servers to tunnel malicious traffic undetected.

A novel command-and-control (C2) evasion method, termed "Ghost Calls," has emerged as a significant threat in post-exploitation scenarios. This innovative technique exploits TURN (Traversal Using Relays around NAT) servers operated by leading communication platforms such as Zoom and Microsoft Teams, enabling attackers to tunnel malicious traffic through infrastructure that is inherently trusted by most organizations. The stealth and sophistication of this approach pose unique challenges to traditional security defenses.
Threat actors are using Microsoft Teams to distribute sophisticated Mantanbuchus 3.0 malware loaders.

Threat actors are using Microsoft Teams to distribute sophisticated Mantanbuchus 3.0 malware loaders.

Security researchers have uncovered a new wave of targeted cyberattacks in which threat actors are leveraging Microsoft Teams to distribute Matanbuchus 3.0, a sophisticated malware loader. These attacks exploit the growing reliance on Microsoft Teams as a trusted internal communication tool, using it as a vector to bypass traditional email-based security controls and deceive victims through social engineering.