This blog post focuses on the privacy issues that Microsoft Teams & Skype desktop clients pose. The log database in both clients stores all the chats and images as plain non-encrypted data. The chats are encrypted via network as mentioned here https://docs.microsoft.com/en-us/microsoftteams/teams-security-guide but not encrypted at rest in local storage.
With Supervision policies, only the authorized person can monitor chats, but due to the non-encrypted storage, any account with administrative privileges can view the chats of the users from the target machine. This issue may pose a violation of regulatory compliance and/or risk management.
One can easily locate the chat database files and exfiltrate via any offensive medium.
1. For Chats:
Microsoft Teams –
Command : Strings 000103.log | grep “<div>”
Skype –
Command : strings 000067.ldb | grep "content"
2. For Images:
Windows:
Microsoft Teams – 1.3.00.30866
Skype for Desktop – 8.66.0.77
MacOS:
Microsoft Teams – 1.3.00.30874
Skype for Desktop - 8.66.0.74
Using the above steps an attacker can grab:
A seasoned log folder could have multiple backups of old chats:
From the Threat Hunting perspective,
Mitigations
A quick workaround for this issue is to deny read/write permissions for the standard user accounts to folders “IndexedDB” and “Cache” to prevent the creation of the logs as you can see in the screenshot below:
We reported this issue to Microsoft through our responsible disclosure program. They responded, "We determined that this behavior is considered to be by design."
Trustwave is exercising extra vigilance in monitoring this kind of traffic. We regularly monitor and improve our threat hunting plans for all global cyber events and all organizations can undertake similar operations within their environment. Contact Trustwave about engaging professional threat hunting.