{"id":1514,"date":"2023-09-22T15:21:01","date_gmt":"2023-09-22T19:21:01","guid":{"rendered":"https:\/\/i-techsolutions.ca\/?p=1514"},"modified":"2023-09-22T15:23:29","modified_gmt":"2023-09-22T19:23:29","slug":"microsoft-teams-the-new-target-of-cybercriminals","status":"publish","type":"post","link":"https:\/\/i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/","title":{"rendered":"Microsoft Teams, The New Target of Cybercriminals"},"content":{"rendered":"<section id=\"block-650de9aea6210\" class=\"block content-2-col-text-button block__spacing-top-small block__spacing-bottom-none\" data-watch>\n  <div class=\"container\">\n    <div class=\"content-2-col-text-button-inner\">\n      <div class=\"top\">\n        \n      <\/div>\n      <div class=\"bottom\">\n        <div class=\"left-column\"><\/div>\n        <div class=\"right-column\">\n                      <a class=\"button\" href=\"https:\/\/i-techsolutions.ca\/contact\/\"> Contact our experts<\/a>\n                  <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n<section id=\"block-650de9aea6266\" class=\"block content-simple block__spacing-top-small block__spacing-bottom-none\" data-watch>\n  <div class=\"container\">\n    <div class=\"content-simple-inner common-text\"><p><strong>Microsoft Teams<\/strong> has become a pillar of professional communication and collaboration, enabling teams to work together effectively, whether in the office or remotely. However, like any popular technology, <span style=\"color: #ff9900;\">Microsoft Teams is not immune to vulnerabilities and security threats<\/span>. Microsoft recently published a report regarding cyberattacks carried out against Microsoft Team by exploiting social engineering to deceive users and distribute malware.<\/p>\n<p>One of these vulnerabilities, dubbed \u201c<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/08\/02\/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams\/\">Midnight Blizzard<\/a>,\u201d deserves special attention. In this article, we&#8217;ll explore this phenomenon and how you can protect your business.<\/p>\n<\/div>\n  <\/div>\n<\/section>\n\n<section id=\"block-650de9aea628e\" class=\"block content-simple block__spacing-top-small block__spacing-bottom-none\" data-watch>\n  <div class=\"container\">\n    <div class=\"content-simple-inner common-text\"><h3>How does this new type of attack work?<\/h3>\n<p>These new attack methods against Microsoft Teams aim <span style=\"color: #ff9900;\">to deceive user vigilance and bypass the protection mechanisms<\/span> put in place in your Azure or Microsoft 365 organization.<\/p>\n<p>Malicious actors use compromised accounts from businesses to launch their attacks. By modifying the name and domain of compromised accounts, they pretend to be a Microsoft service such as &#8220;Microsoft Identity Protection&#8221; in order to fool users. A communication request is then sent to the user, if they accept, the attacker then tries to convince them to enter a code in the <a href=\"https:\/\/www.microsoft.com\/fr-ca\/security\/mobile-authenticator-app\">Authenticator<\/a> application in order to bypass Multi-Factor Authentication (MFA)<\/p>\n<\/div>\n  <\/div>\n<\/section>\n\n<section id=\"block-650de9aea62ab\" class=\"block content-2-col-image-text content-2-col-image-text__background-style-blue\" data-watch>\n  <div class=\"content-2-col-image-text-inner\">\n    <div class=\"left-column\">\n      <div class=\"image image--fill \">\n\t\t\t\t<div class=\"frame\">\n\t\t\t\t\t<picture>\n\t\t\t\t\t\t<source srcset=\"https:\/\/i-techsolutions.ca\/app\/uploads\/2023\/09\/Cybersecurite_intune_Teams.webp\" type=\"image\/webp\"\/>\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i-techsolutions.ca\/app\/uploads\/2023\/09\/Cybersecurite_intune_Teams.webp\">\n\t\t\t\t\t<\/picture>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n    <\/div>\n    <div class=\"right-column common-text\">\n      <div class=\"background-wrapper\"><\/div>\n      <div class=\"right-column-inner\"><h3>Step 1:<\/h3>\n<p>An external communication request is routed using a trusted pseudonym, in this example the request appears to come from the <a href=\"https:\/\/www.microsoft.com\/fr-ca\/security\/business\/siem-and-xdr\/microsoft-defender-for-identity\">Microsoft Identity Protection Service<\/a>. A user may be fooled by the legitimate appearance of this request if they do not pay attention to the red indicators in this image.<\/p>\n<\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n<section id=\"block-650de9aea62c7\" class=\"block content-simple block__spacing-top-none block__spacing-bottom-small\" data-watch>\n  <div class=\"container\">\n    <div class=\"content-simple-inner common-text\"><\/div>\n  <\/div>\n<\/section>\n\n<section id=\"block-650de9aea62dc\" class=\"block content-2-col-image-text content-2-col-image-text__background-style-blue\" data-watch>\n  <div class=\"content-2-col-image-text-inner\">\n    <div class=\"left-column\">\n      <div class=\"image image--fill \">\n\t\t\t\t<div class=\"frame\">\n\t\t\t\t\t<picture>\n\t\t\t\t\t\t<source srcset=\"https:\/\/i-techsolutions.ca\/app\/uploads\/2023\/09\/microsoft_teams_securite_authenticator-1.webp\" type=\"image\/webp\"\/>\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i-techsolutions.ca\/app\/uploads\/2023\/09\/microsoft_teams_securite_authenticator-1.webp\">\n\t\t\t\t\t<\/picture>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n    <\/div>\n    <div class=\"right-column common-text\">\n      <div class=\"background-wrapper\"><\/div>\n      <div class=\"right-column-inner\"><h3>Step 2:<\/h3>\n<p>If the user accepts the conversation, the attacker will attempt to gain access to the account by bypassing Multi-Factor Authentication (MFA) methods. To achieve this, the attacker simply needs to enter a code into the targeted user&#8217;s Microsoft Authenticator application, which will allow them to gain full control of the user&#8217;s Microsoft account.<\/p>\n<p>To deceive the user, a message is displayed suggesting recent changes to their account authentication methods and that they must confirm their identity.<\/p>\n<\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n<section id=\"block-650de9aea62fe\" class=\"block content-simple block__spacing-top-small block__spacing-bottom-none\" data-watch>\n  <div class=\"container\">\n    <div class=\"content-simple-inner common-text\"><h3>Features included in Microsoft Teams to protect you<\/h3>\n<ul>\n<li><strong>Explicit request:<\/strong> End users do not see messages unless they click to preview them, users are reminded of the risks of external chat and are asked to explicitly accept or block the message request.<br \/>\nExternal<\/li>\n<li><strong>Identifiy:<\/strong> Visible in both the discussion list and the discussion header.<\/li>\n<li><strong>Spam Checks:<\/strong> Prior to explicit \u201copt-in,\u201d every message sent from a Teams personal account is subject to run-time spam checks. If spam is detected, the chat message is not sent.<\/li>\n<li><strong>User Security:<\/strong> To help protect the user, Microsoft only displays the name and email address, but no other identifiers like profile photos.<\/li>\n<\/ul>\n<p>The majority of these measures allow users to detect the validity of a Teams conversation via certain criteria. <strong>What about incidents that are not detected or simply not reported by users?<\/strong><\/p>\n<\/div>\n  <\/div>\n<\/section>\n\n<section id=\"block-650de9aea6347\" class=\"block content-simple block__spacing-top-small block__spacing-bottom-none\" data-watch>\n  <div class=\"container\">\n    <div class=\"content-simple-inner common-text\"><h3>Using <a href=\"https:\/\/www.microsoft.com\/fr-ca\/security\/business\/microsoft-intune\">Microsoft Intune<\/a> and <a href=\"https:\/\/azure.microsoft.com\/fr-ca\/products\/microsoft-sentinel\">Microsoft Sentinel<\/a> can significantly strengthen the security of your Teams, SharePoint, and Azure environment. Here are the advantages of these solutions:<\/h3>\n<h4>Microsoft Intune :<\/h4>\n<p><strong>Device management:<\/strong> Intune lets you manage the devices used to access Teams. You can apply security policies to devices to ensure they comply with security standards. <span style=\"color: #ff9900;\">Only authorized devices have access to your data.<\/span><\/p>\n<p><strong>Access control:<\/strong> Use Intune to configure access control policies, including managing access rights to data and applications on devices. <span style=\"color: #ff9900;\">Reduce the attack surface by limiting the geographic areas that have access to your data.<\/span><\/p>\n<p><strong>App configuration:<\/strong> You can configure Teams app configuration policies to define specific security settings, such as <span style=\"color: #ff9900;\">Multi-Factor Authentication (MFA)<\/span> for Teams and Azure.<\/p>\n<p><strong>Securing data:<\/strong> Intune lets you <span style=\"color: #ff9900;\">encrypt data on devices<\/span> to prevent unauthorized access.<\/p>\n<p><strong>Update management:<\/strong> Ensure devices used to access Teams are always up to date with <span style=\"color: #ff9900;\">the latest security patches by setting up update management policies.<\/span><\/p>\n<h4>Microsoft Sentinel:<\/h4>\n<p><strong>Advanced monitoring:<\/strong> Microsoft Sentinel is a security event management (SIEM) solution that allows you <span style=\"color: #ff9900;\">to monitor activities in your Teams, Azure and Office 365<\/span> environment in real time. Microsoft Sentinel allows you to detect potential threats, alert your security teams and automatically trigger protection measures based on the type of threat.<\/p>\n<p><strong>Threat detection:<\/strong> Configure threat detection rules in Sentinel <span style=\"color: #ff9900;\">to monitor suspicious behavior<\/span>, abnormal login activities, and indicators of compromise related to Teams, Azure, and Office365.<\/p>\n<p><strong>Incident response:<\/strong> Create <span style=\"color: #ff9900;\">automated<\/span> workflows in Sentinel to quickly respond to security incidents related to Teams, Azure and Office365, such as quarantining a compromised user.<\/p>\n<p><strong>Integration with Teams:<\/strong> Microsoft Sentinel can be integrated with Teams, Azure, and Office365 to collect activity logs and other security data. <span style=\"color: #ff9900;\">This allows comprehensive monitoring of your Microsoft cloud environment.<\/span><\/p>\n<p><strong>Security Reports:<\/strong> Use Sentinel to generate custom security reports and to maintain <span style=\"color: #ff9900;\">an overview of the security<\/span> of your Teams, Azure and Office365 environment.<\/p>\n<p>The combination of Microsoft Intune and Microsoft Sentinel provides in-depth management and monitoring of your Microsoft cloud solution, <span style=\"color: #ff9900;\">strengthening the overall security of the platform<\/span>. It is essential to configure these services properly, monitor activities closely, and respond promptly to any potential threats to keep your data secure.<\/p>\n<\/div>\n  <\/div>\n<\/section>\n\n<section id=\"block-650de9aea75c6\" class=\"block content-2-col-text-button block__spacing-top-small block__spacing-bottom-none\" data-watch>\n  <div class=\"container\">\n    <div class=\"content-2-col-text-button-inner\">\n      <div class=\"top\">\n        <p><strong>Our certified Azure <a href=\"https:\/\/i-techsolutions.ca\/cybersecurite\/\">Cybersecurity team<\/a> can help you identify current risks in your Azure cloud environment and implement solutions tailored to your needs in order to secure your Microsoft Azure, SharePoint, Teams and Office365 solutions.<\/strong><\/p>\n\n      <\/div>\n      <div class=\"bottom\">\n        <div class=\"left-column\"><\/div>\n        <div class=\"right-column\">\n                      <a class=\"button\" href=\"https:\/\/i-techsolutions.ca\/contact\/\">Contact our experts<\/a>\n                  <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":1023,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23,24],"tags":[],"class_list":["post-1514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-microsoft-365"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Microsoft Teams, The New Target of Cybercriminals - ITech Solutions<\/title>\n<meta name=\"description\" content=\"Microsoft Teams has become a pillar of professional communication and collaboration, enabling teams to work together effectively, whether in the office or remotely. However, like any popular technology, Microsoft Teams is not immune to vulnerabilities and security threats. Microsoft recently published a report regarding cyberattacks carried out against Microsoft Team by exploiting social engineering to deceive users and distribute malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Teams, The New Target of Cybercriminals\" \/>\n<meta property=\"og:description\" content=\"Microsoft Teams has become a pillar of professional communication and collaboration, enabling teams to work together effectively, whether in the office or remotely. However, like any popular technology, Microsoft Teams is not immune to vulnerabilities and security threats. Microsoft recently published a report regarding cyberattacks carried out against Microsoft Team by exploiting social engineering to deceive users and distribute malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/\" \/>\n<meta property=\"og:site_name\" content=\"ITech Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-22T19:21:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-22T19:23:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/backup-18-07-2024.i-techsolutions.ca\/app\/uploads\/2023\/09\/cybersecurite_teams.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Fortin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Fortin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/\"},\"author\":{\"name\":\"Simon Fortin\",\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/#\\\/schema\\\/person\\\/f99199384d87cd2c59402f9daf927450\"},\"headline\":\"Microsoft Teams, The New Target of Cybercriminals\",\"datePublished\":\"2023-09-22T19:21:01+00:00\",\"dateModified\":\"2023-09-22T19:23:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/\"},\"wordCount\":7,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i-techsolutions.ca\\\/app\\\/uploads\\\/2023\\\/09\\\/cybersecurite_teams.jpg\",\"articleSection\":[\"Cybersecurity\",\"Microsoft 365\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/\",\"url\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/\",\"name\":\"Microsoft Teams, The New Target of Cybercriminals - ITech Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i-techsolutions.ca\\\/app\\\/uploads\\\/2023\\\/09\\\/cybersecurite_teams.jpg\",\"datePublished\":\"2023-09-22T19:21:01+00:00\",\"dateModified\":\"2023-09-22T19:23:29+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/#\\\/schema\\\/person\\\/f99199384d87cd2c59402f9daf927450\"},\"description\":\"Microsoft Teams has become a pillar of professional communication and collaboration, enabling teams to work together effectively, whether in the office or remotely. However, like any popular technology, Microsoft Teams is not immune to vulnerabilities and security threats. Microsoft recently published a report regarding cyberattacks carried out against Microsoft Team by exploiting social engineering to deceive users and distribute malware.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i-techsolutions.ca\\\/app\\\/uploads\\\/2023\\\/09\\\/cybersecurite_teams.jpg\",\"contentUrl\":\"https:\\\/\\\/i-techsolutions.ca\\\/app\\\/uploads\\\/2023\\\/09\\\/cybersecurite_teams.jpg\",\"width\":640,\"height\":427,\"caption\":\"LONDON, UK - May 1st 2020: Microsoft teams logo under a magnifying glass\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/microsoft-teams-the-new-target-of-cybercriminals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Teams, The New Target of Cybercriminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/#website\",\"url\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/\",\"name\":\"ITech Solutions\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/backup-18-07-2024.i-techsolutions.ca\\\/#\\\/schema\\\/person\\\/f99199384d87cd2c59402f9daf927450\",\"name\":\"Simon Fortin\",\"url\":\"https:\\\/\\\/i-techsolutions.ca\\\/en\\\/author\\\/admin_simon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Microsoft Teams, The New Target of Cybercriminals - ITech Solutions","description":"Microsoft Teams has become a pillar of professional communication and collaboration, enabling teams to work together effectively, whether in the office or remotely. However, like any popular technology, Microsoft Teams is not immune to vulnerabilities and security threats. Microsoft recently published a report regarding cyberattacks carried out against Microsoft Team by exploiting social engineering to deceive users and distribute malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Teams, The New Target of Cybercriminals","og_description":"Microsoft Teams has become a pillar of professional communication and collaboration, enabling teams to work together effectively, whether in the office or remotely. However, like any popular technology, Microsoft Teams is not immune to vulnerabilities and security threats. Microsoft recently published a report regarding cyberattacks carried out against Microsoft Team by exploiting social engineering to deceive users and distribute malware.","og_url":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/","og_site_name":"ITech Solutions","article_published_time":"2023-09-22T19:21:01+00:00","article_modified_time":"2023-09-22T19:23:29+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/app\/uploads\/2023\/09\/cybersecurite_teams.jpg","type":"image\/jpeg"}],"author":"Simon Fortin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Simon Fortin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/#article","isPartOf":{"@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/"},"author":{"name":"Simon Fortin","@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/#\/schema\/person\/f99199384d87cd2c59402f9daf927450"},"headline":"Microsoft Teams, The New Target of Cybercriminals","datePublished":"2023-09-22T19:21:01+00:00","dateModified":"2023-09-22T19:23:29+00:00","mainEntityOfPage":{"@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/"},"wordCount":7,"commentCount":0,"image":{"@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/i-techsolutions.ca\/app\/uploads\/2023\/09\/cybersecurite_teams.jpg","articleSection":["Cybersecurity","Microsoft 365"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/","url":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/","name":"Microsoft Teams, The New Target of Cybercriminals - ITech Solutions","isPartOf":{"@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/#primaryimage"},"image":{"@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/i-techsolutions.ca\/app\/uploads\/2023\/09\/cybersecurite_teams.jpg","datePublished":"2023-09-22T19:21:01+00:00","dateModified":"2023-09-22T19:23:29+00:00","author":{"@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/#\/schema\/person\/f99199384d87cd2c59402f9daf927450"},"description":"Microsoft Teams has become a pillar of professional communication and collaboration, enabling teams to work together effectively, whether in the office or remotely. However, like any popular technology, Microsoft Teams is not immune to vulnerabilities and security threats. Microsoft recently published a report regarding cyberattacks carried out against Microsoft Team by exploiting social engineering to deceive users and distribute malware.","breadcrumb":{"@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/#primaryimage","url":"https:\/\/i-techsolutions.ca\/app\/uploads\/2023\/09\/cybersecurite_teams.jpg","contentUrl":"https:\/\/i-techsolutions.ca\/app\/uploads\/2023\/09\/cybersecurite_teams.jpg","width":640,"height":427,"caption":"LONDON, UK - May 1st 2020: Microsoft teams logo under a magnifying glass"},{"@type":"BreadcrumbList","@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/microsoft-teams-the-new-target-of-cybercriminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Microsoft Teams, The New Target of Cybercriminals"}]},{"@type":"WebSite","@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/#website","url":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/","name":"ITech Solutions","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/backup-18-07-2024.i-techsolutions.ca\/#\/schema\/person\/f99199384d87cd2c59402f9daf927450","name":"Simon Fortin","url":"https:\/\/i-techsolutions.ca\/en\/author\/admin_simon\/"}]}},"_links":{"self":[{"href":"https:\/\/i-techsolutions.ca\/en\/wp-json\/wp\/v2\/posts\/1514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/i-techsolutions.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/i-techsolutions.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/i-techsolutions.ca\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/i-techsolutions.ca\/en\/wp-json\/wp\/v2\/comments?post=1514"}],"version-history":[{"count":0,"href":"https:\/\/i-techsolutions.ca\/en\/wp-json\/wp\/v2\/posts\/1514\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/i-techsolutions.ca\/en\/wp-json\/wp\/v2\/media\/1023"}],"wp:attachment":[{"href":"https:\/\/i-techsolutions.ca\/en\/wp-json\/wp\/v2\/media?parent=1514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/i-techsolutions.ca\/en\/wp-json\/wp\/v2\/categories?post=1514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/i-techsolutions.ca\/en\/wp-json\/wp\/v2\/tags?post=1514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}