Microsoft Exposes Russian Hackers’ Sneaky Phishing Tactics via Microsoft Teams Chats

Share:

Microsoft on Wednesday disclosed that it identified a set of highly targeted social engineering attacks mounted by a Russian nation-state threat actor using credential theft phishing lures sent as Microsoft Teams chats.

The tech giant attributed the attacks to a group it tracks as Midnight Blizzard (previously Nobelium). It’s also called APT29, BlueBravo, Cozy Bear, Iron Hemlock, and The Dukes.

In this latest activity, the threat actor uses previously compromised Microsoft 365 tenants owned by small businesses to create new domains that appear as technical support entities, the company said.

Using these domains from compromised tenants, Midnight Blizzard leverages Teams messages to send lures that attempt to steal credentials from a targeted organization by engaging a user and eliciting approval of multi-factor authentication (MFA) prompts.

Microsoft said the campaign, observed since at least late May 2023, affected less than 40 organizations globally spanning government, non-government organizations (NGOs), IT services, technology, discrete manufacturing, and media sectors.

The threat actor has been observed to utilize token theft techniques for initial access into targeted environments, alongside other methods such as authentication spear-phishing, password spray, and brute-force attacks.

Another known hallmark is its exploitation of on-premises environments to laterally move to the cloud as well as the abuse of service providers’ trust chain to gain access to downstream customers, as observed in the SolarWinds hack of 2020.

In the new round of attacks linked to Midnight Blizzard, a new onmicrosoft.com subdomain is added to a tenant previously compromised in attacks, followed by creating a new user with that subdomain to initiate a Teams chat request with potential targets by masquerading as a technical support person or Microsoft’s Identity Protection team.

If the target user accepts the message request, the user then receives a Microsoft Teams message from the attacker attempting to convince them to enter a code into the Microsoft Authenticator app on their mobile device, Microsoft explained.

Should the victim follow through with the instructions, the threat actor is granted a token to authenticate as the targeted user, thereby allowing for account takeover and follow-on post-compromise activity.

In some cases, the actor attempts to add a device to the organization as a managed device via Microsoft Entra ID (formerly Azure Active Directory), likely an attempt to circumvent conditional access policies configured to restrict access to specific resources to managed devices only, Microsoft cautioned.

The findings come days after the threat actor was attributed to phishing attacks targeting diplomatic entities throughout Eastern Europe with the goal of delivering a new backdoor called GraphicalProton.

They also follow the discovery of several new Azure AD (AAD) Connect attack vectors that could allow malicious cyber actors to create an undetectable backdoor by stealing cryptographic hashes of passwords by injecting malicious code into a hash syncing process and intercepting credentials by means of an adversary-in-the-middle (AitM) attack.

For example, attackers can leverage the extraction of NT hashes to ensure they receive every future password change in the domain, Sygnia said in a statement shared with The Hacker News.

Threat actors can also use [Active Directory Certificate Services] to obtain AAD Connector passwords, as well as serve as a man-in-the-middle and launch attacks against SSL-encrypted channels in the network by exploiting misconfigurations in certificate templates that have server authentication.

 

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

 

(c) Thin

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:38 am, May 18, 2025
weather icon 12°C
L: 11° | H: 14°
scattered clouds
Humidity: 68 %
Pressure: 1021 mb
Wind: 4 mph N
Wind Gust: 8 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 26%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:04 am
Sunset: 8:49 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
11° | 14°°C 0 mm 0% 8 mph 64 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
9° | 19°°C 0.2 mm 20% 12 mph 80 % 1022 mb 0 mm/h
Tue May 20 10:00 pm
weather icon
9° | 21°°C 0 mm 0% 8 mph 71 % 1023 mb 0 mm/h
Wed May 21 10:00 pm
weather icon
12° | 18°°C 1 mm 100% 7 mph 89 % 1020 mb 0 mm/h
Thu May 22 10:00 pm
weather icon
9° | 19°°C 0 mm 0% 8 mph 59 % 1022 mb 0 mm/h
Today 1:00 pm
weather icon
13° | 15°°C 0 mm 0% 8 mph 62 % 1020 mb 0 mm/h
Today 4:00 pm
weather icon
16° | 18°°C 0 mm 0% 8 mph 49 % 1019 mb 0 mm/h
Today 7:00 pm
weather icon
16° | 16°°C 0 mm 0% 7 mph 47 % 1019 mb 0 mm/h
Today 10:00 pm
weather icon
13° | 13°°C 0 mm 0% 7 mph 64 % 1020 mb 0 mm/h
Tomorrow 1:00 am
weather icon
12° | 12°°C 0 mm 0% 7 mph 71 % 1020 mb 0 mm/h
Tomorrow 4:00 am
weather icon
9° | 9°°C 0 mm 0% 6 mph 80 % 1021 mb 0 mm/h
Tomorrow 7:00 am
weather icon
10° | 10°°C 0 mm 0% 6 mph 74 % 1021 mb 0 mm/h
Tomorrow 10:00 am
weather icon
16° | 16°°C 0 mm 0% 8 mph 55 % 1021 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€93,162.81
0.90%
Ethereum(ETH)
€2,257.10
1.66%
Tether(USDT)
€0.90
0.00%
XRP(XRP)
€2.15
1.28%
Solana(SOL)
€153.46
1.98%
USDC(USDC)
€0.90
0.00%
Dogecoin(DOGE)
€0.200747
4.01%
Shiba Inu(SHIB)
€0.000013
4.62%
Pepe(PEPE)
€0.000012
7.37%
Peanut the Squirrel(PNUT)
€0.321460
25.80%
Scroll to Top