Newsletter
Advisories, Vulnerabilities & Alerts
Ethan Grammer
Senior Infrastructure
& Cybersecurity Engineer

Guillermo Sanchez
Senior Cybersecurity Engineer

Hackers Exploit Microsoft Teams Messages to Deliver Malware
Description:
Recent cybersecurity analyses have revealed a sophisticated malware campaign targeting Microsoft Teams users. Attackers are leveraging the platform’s communication features to bypass traditional security measures, deploying malicious PowerShell scripts that compromise systems by stealing credentials and establishing persistent backdoors.
Attackers impersonate IT administrators or trusted contacts, sending deceptive messages that prompt users to execute malicious commands. Post initial access, attackers utilize tools like Microsoft Quick Assist to gain remote control, interacting with compromised machines under the guise of legitimate support.
Recommended Actions:
- Restrict External Communications: Configure Microsoft Teams to limit interactions with external users, reducing exposure to unsolicited messages.
- Enforce PowerShell Execution Policies: Implement strict policies to allow only signed scripts to run, minimizing the risk of executing unauthorized commands.
- Monitor Remote Access Tools: Regularly audit and control the use of remote assistance tools to prevent unauthorized access.
- Educate Employees: Conduct ongoing training to help staff recognize phishing attempts and understand the importance of verifying unexpected communications.
External Links:
VMware Tools for Windows Authentication Bypass Vulnerability
Description:
On March 25, 2025, VMware released a security advisory (VMSA-2025-0005) addressing an authentication bypass vulnerability identified in VMware Tools for Windows, designated as CVE-2025-22230. The vulnerability stems from improper access control mechanisms within VMware Tools for Windows. A malicious actor with non-administrative privileges on a Windows guest virtual machine (VM) could exploit this flaw to perform certain high-privilege operations within that VM. VMware has assigned this vulnerability a CVSSv3 base score of 7.8, categorizing it as a high-severity issue.
VMware Tools versions 11.x.x and 12.x.x running on Windows operating systems are affected by this vulnerability. VMware Tools running on Linux and macOS are not impacted. VMware has released VMware Tools version 12.5.1 to address this vulnerability. Admins are strongly encouraged to update to this latest version to mitigate potential risks.
Recommended Actions:
- Update VMware Tools: Ensure that all Windows guest VMs are running VMware Tools version 12.5.1 or later.
- Review Access Controls: Regularly audit and enforce strict access controls to limit non-administrative users from performing unauthorized operations.
- Monitor Systems: Continuously monitor systems for unusual activity that may indicate exploitation attempts.
External Links:

Celito is a team of experienced IT Executives, Industry Professionals, and Business Consultants focused on the life sciences industry.
Products
Consulting
Company
Celito Tech, Inc.
CORPORATE HEADQUARTERS
2100 Geng Road Suite #210
Palo Alto, CA 94303
CALIFORNIA OFFICE
842 Main St.
Redwood City, CA 94063
+1 650.374.2121
FLORIDA OFFICE
1221 Brickell Avenue Suite #900
Miami, FL 33131
Celito Tech, Inc.
INDIA OFFICE
Celito Tech India Pvt Ltd.
Flat No.A105, 1st Floor
Aditya's Imperial Heights,
Hyderabad, Rangareddi-500049
Telangana, India
+91 984.902.4174
Privacy Policy | Cookie Policy | Terms of Service | Copyright 2021 © Celito Tech, Inc.