Microsoft Teams Guest Chat Flaw Exposes Users to Malware Attacks
- Nov 26, 2025
- 2 min read
Key Findings
Microsoft Teams' "Guest Access" feature allows attackers to bypass security controls like Microsoft Defender for Office 365, creating a "protection-free zone" for malware delivery.
Attackers can easily create basic Microsoft 365 accounts without security features and use them to send phishing links and malware to guest users.
A recent Microsoft feature that allows any Teams user to start a chat with any email address makes it even easier for attackers to lure victims into the unprotected environment.
Experts urge immediate action to limit guest invitations to only trusted domains to mitigate this serious architectural problem.
Background
Microsoft Teams has become a crucial communication tool for businesses globally, leading security teams to invest heavily in protection services like Microsoft Defender for Office 365. However, new research from security firm Ontinue reveals a significant security flaw in the standard setup of Microsoft Teams' collaboration with external partners, known as B2B Guest Access.
Bypass of Security Controls
The problem lies in the way security is managed when employees work with external groups. When a user accepts a guest invitation and joins another company's chat, their security is no longer determined by their home organization. Instead, the research found that security is controlled "entirely by that hosting environment."
This means that the moment a user accepts a guest invite, they instantly lose all their home security features, including Safe Links and Zero-hour Auto Purge (ZAP), which are designed to protect against malicious links and messages.
Attackers Exploiting the Flaw
Attackers are well aware of this security gap and can create their own basic Microsoft 365 accounts with security policies completely switched off, effectively creating a "protection-free zone." These basic accounts lack security packages like Defender, making them unprotected by default, and requiring minimal resources for the attacker to set up.
The Easy Way In
Further exacerbating the problem is a recent Microsoft feature that allows any Teams user to start a chat with any email address, even people not currently using Teams. The victim receives a genuine-looking Microsoft invitation and needs only a single click to enter the malicious, unprotected environment.
Experts Urge Immediate Action
Industry leaders have emphasized that this is a serious architectural problem that requires a configuration change, not just a patch. They recommend that organizations limit guest invitations to only those domains they explicitly trust and ensure that access is appropriately limited and activity tied to sensitive systems is consistently monitored.
Sources
https://hackread.com/microsoft-teams-guest-chat-flaw-malware/
https://thehackernews.com/2025/11/romcom-uses-socgholish-fake-update.html


Comments