Cyvisorycyvisory.hashnode.dev·Aug 2, 2023Obscurities with MS Teams part 3This time we look mostly at the accounts used for phishing. tl;dr When phishing via Teams, an attacker controls the source AAD. Therefore, he can set every username he wants. This opens some possibilities. E-Mail as username Suffix the Username to ...110 readsMicrosoftTeamsAdd a thoughtful commentNo comments yetBe the first to start the conversation.