TLDR: Hackers trick users with fake podcast invites before requesting screen control through Microsoft Teams. Once granted, attackers get remote desktop access and can run code that drains crypto wallets. Security researcher Nick Bax says millions are already gone, hitting both project leaders and regular holders. Experts call for clearer Microsoft Teams warnings to stop [...] The post Hackers Use Microsoft Teams to Hijack Crypto Wallets: What To Know appeared first on Blockonomi.TLDR: Hackers trick users with fake podcast invites before requesting screen control through Microsoft Teams. Once granted, attackers get remote desktop access and can run code that drains crypto wallets. Security researcher Nick Bax says millions are already gone, hitting both project leaders and regular holders. Experts call for clearer Microsoft Teams warnings to stop [...] The post Hackers Use Microsoft Teams to Hijack Crypto Wallets: What To Know appeared first on Blockonomi.

Hackers Use Microsoft Teams to Hijack Crypto Wallets: What To Know

2025/09/13 16:42

TLDR:

  • Hackers trick users with fake podcast invites before requesting screen control through Microsoft Teams.
  • Once granted, attackers get remote desktop access and can run code that drains crypto wallets.
  • Security researcher Nick Bax says millions are already gone, hitting both project leaders and regular holders.
  • Experts call for clearer Microsoft Teams warnings to stop more crypto users from falling victim.

Hackers have found a new way to clean out crypto wallets, and it’s catching people off guard. The method is simple, built on trust, and ends with stolen funds. 

Security researcher Nick Bax shared details of the attack, warning that millions are already gone. Both project founders and everyday investors have been hit. This is a growing problem for the crypto community, and it relies on social engineering more than tech.

Bax explained that hackers are using Microsoft Teams calls to take full control of victims’ desktops. They first gain access to a real Twitter or Telegram account, or create a convincing fake. Then they contact their target with an offer: usually a podcast interview, partnership call, or investor chat.

The conversation continues until the hacker asks the victim to screen-share their project. After some time, they claim they need to share something too. That’s when a request appears asking for “control” of the screen. Most users think this is harmless and click accept.

Once accepted, the hacker has remote control of the computer. Bax warned that they can now run commands, install malware, and empty wallets. This is not a technical exploit but a social one, and it works.

Crypto Security Risks Widen

According to Bax, this attack is harder to spot on Microsoft Teams because of how the dialog is worded. The message says “Requesting control,” which sounds routine. On other platforms like Zoom, there are extra warning clicks before control is handed over. This difference makes Teams a softer target.

Bax even tested creating a fake Teams account using Cyrillic characters to mimic “Microsoft Teams.” He said the platform allowed it, making it easier for attackers to trick victims. The result is a mix of bad UX design and patient social engineering.

This attack has been active for months and keeps evolving. The initial hook may change, but the result is the same: a complete desktop takeover. Crypto investors and project leaders are urged to treat all screen control requests as high-risk.

Security experts say users should verify who they are speaking to before any screen share. Turning off screen control permissions unless absolutely needed can also prevent attacks. Bax called on Microsoft to add clearer warnings so users understand what they are agreeing to before control is granted.

The post Hackers Use Microsoft Teams to Hijack Crypto Wallets: What To Know appeared first on Blockonomi.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

OFAC Designates Two Iranian Finance Facilitators For Crypto Shadow Banking

OFAC Designates Two Iranian Finance Facilitators For Crypto Shadow Banking

The Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned two Iranian financial facilitators for coordinating over $100 million worth of cryptocurrency in oil sales for the Iranian government, a September 16 press release shows. OFAC Sanctions Iranian Nationals According to the Tuesday press release, Iranian nationals Alireza Derakhshan and Arash Estaki Alivand “used a network of front companies in multiple foreign jurisdictions” to transfer the digital assets. OFAC alleges that Alivand and Derakhshan’s transfers also involved the sale of Iranian oil that benefited Iran’s Islamic Revolutionary Guard Corps-Qods Force (IRGC-QF) and the Ministry of Defense and Armed Forces Logistics (MODAFL). IRGC-QF and MODAFL then used the proceeds to support regional proxy terrorist organizations and strengthen their advanced weapons systems, including ballistic missiles. U.S. officials say the move targets shadow banking in the region, where illicit financial actors use overseas money laundering and digital assets to evade sanctions. “Iranian entities rely on shadow banking networks to evade sanctions and move millions through the international financial system,” said Under Secretary of the Treasury for Terrorism and Financial Intelligence John K. Hurley. “Under President Trump’s leadership, we will continue to disrupt these key financial streams that fund Iran’s weapons programs and malign activities in the Middle East and beyond,” he continued. Dozens Designated In Shadow Banking Scandal Both Alivand and Derakhshan have been designated “for having materially assisted, sponsored, or provided financial, material, or technological support for, or goods or services to or in support of the IRGC-QF.” In addition to Alivand and Derakhshan, OFAC has sanctioned more than a dozen Hong Kong and United Arab Emirates-based entities and individuals tied to the network. According to the press release, the sanctioned entities may face civil or criminal penalties imposed as a result
Share
CryptoNews2025/09/18 11:18