feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouUnited StatesUnited States
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / Hackers Use Teams Guest Invites for Fraud

Hackers Use Teams Guest Invites for Fraud

29 Jan

Summary

  • Attackers exploit Microsoft Teams guest invites for scams.
  • Obfuscated team names bypass detection and trick users.
  • Scammers use fraudulent calls to steal credentials.
Hackers Use Teams Guest Invites for Fraud

Cybercriminals have adopted a new strategy, exploiting Microsoft Teams' legitimate 'Invite a Guest' feature to distribute scam emails. These attackers meticulously craft finance-themed or urgent billing team names, often employing obfuscation techniques like mixed Unicode characters or visually similar symbols. This clever tactic allows the malicious team names to evade automated detection systems while still appearing normal to unsuspecting users.

Once a deceptive team is established, the attackers utilize the 'Invite a Guest' function to dispatch official-looking Microsoft emails directly to their targets. These messages are designed to appear credible, significantly increasing the likelihood of user engagement. The phishing emails instruct recipients to contact a fraudulent support number concerning supposed subscription or billing issues. During these calls, the perpetrators actively attempt to glean login credentials or other sensitive data that could grant access to corporate email accounts and internal systems.

This sophisticated campaign deviates from conventional phishing methods by deliberately avoiding malicious links or malware attachments. Instead, it relies heavily on social engineering and psychological manipulation to compromise user accounts. The combination of seemingly official Microsoft communication and urgent, finance-related language fosters a heightened sense of trust, rendering standard firewall protections less effective. Consequently, heightened user vigilance is critical in identifying and reporting these subtle red flags, such as unusual formatting or suspicious payment-related information in team invitations.

Research indicates that this attack has impacted organizations across various sectors, including manufacturing, technology, education, and professional services worldwide. While attackers do not appear to target specific industries deliberately, the campaign highlights the broad vulnerability of trusted collaboration platforms. The affected organizations were primarily concentrated in the United States, representing nearly 68% of incidents, followed by Europe (15.8%) and Asia (6.4%). Brazil and Mexico showed the highest activity within Latin America. Vigilance, staff awareness training, and prompt reporting remain essential defenses against this evolving threat.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
Hackers are creating finance-themed Microsoft Teams with obfuscated names and using the 'Invite a Guest' feature to send official-looking emails that prompt users to call fraudulent support numbers.
The scam relies on social engineering, using urgent, finance-related language and official-looking Microsoft messages to trick users into calling fraudulent support numbers to steal credentials, rather than using phishing links or malware.
The United States was most affected, accounting for nearly 68% of incidents, followed by Europe with 15.8% and Asia with 6.4%.

Read more news on

Technologyside-arrowBrazilside-arrowEuropeside-arrowMexicoside-arrow
•
trending

Ohio snow emergency declared

trending

TikTok down in United States

trending

Andreeva matches Venus Williams' feat

trending

Warrington Hospital baby death

trending

Alexander Zverev advances in Australia

trending

Oilers host Capitals

trending

London celebrates Chinese New Year

trending

Liza Minnelli defends AI use

You may also like

Defense IPO Shatters Records: A $3.8 Billion Debut

26 Jan • 13 reads

article image

UK Police Admit AI Flaws: Copilot Creates Fake Soccer Match

14 Jan • 39 reads

article image

Xbox Cloud Gaming Soars: Streaming Hours Up 45%

16 Dec, 2025 • 190 reads

article image

UK Eyes Phone Nudity Blocks for Kids

16 Dec, 2025 • 225 reads

article image

Microsoft Teams Adds Call Recording for Personal Accounts

10 Dec, 2025 • 178 reads

article image