Recently, a significant cyberattack has shaken three London councils, exploiting Microsoft Teams and raising concerns about the platform’s vulnerabilities. The breach, initially impacting Kensington and Chelsea Council, has spread to Westminster City Council and Hammersmith and Fulham Council due to their interconnected IT infrastructure. These councils together serve approximately half a million residents.
During the attack, sensitive personal data was copied, disrupting Westminster’s operations, particularly their financial systems. This disruption has caused significant delays in supplier payments, highlighting the severe operational impacts beyond data theft.
The cyberattack emerged at Kensington and Chelsea Council last November and quickly spread to the partnering councils. The breach was disclosed by Westminster on December 17, indicating that sensitive historical data had been extracted. Westminster Council Leader, Elizabeth Campbell, stressed transparency, ensuring that those affected were informed promptly.
Following the breach, hackers continued targeting council staff by leveraging Microsoft Teams to initiate unexpected calls and meeting invitations. Cyber researchers have also identified a vulnerability in Teams’ guest chat feature, allowing malicious actors to bypass security and conduct phishing attacks. This underscores the inherent risks in trusted communication platforms.
The National Cyber Security Centre is assisting with recovery efforts, although a complete timeline for restoring full functionality remains elusive. Notably, while Westminster’s data was copied, it was neither deleted nor lost, yet investigations into the breach are ongoing.
The incident reveals a worrisome trend among cybercriminals. Rather than vanish post-breach, these actors persist with social engineering tactics using platforms like Teams. This enables them to deepen their intrusion or gather more sensitive data.
In response, IT leaders must scrutinize and tighten external access controls in Teams environments. Default settings often allow contact initiation from outside the organization, posing unnoticed vulnerabilities. To mitigate risks, organizations should require approval for external meeting participants and restrict communications to verified domains, especially when dealing with sensitive data.
Equipping staff with specific security awareness training is critical. Training should include recognizing suspicious Teams activities such as unsolicited meeting invitations and unexpected calls from external sources. Verifying external contacts before engaging in sensitive conversations is essential.
Implementing monitoring tools to capture Teams communication patterns and flag unusual behaviors would drastically improve security. This technology should integrate with existing security management systems to detect coordinated attacks swiftly.
This cyberattack demonstrates the evolving landscape of threats, where hackers capitalize on trusted communication tools. The choice to exploit Microsoft Teams indicates attackers’ understanding of the platform’s inherent credibility, often bypassed by traditional security measures.
For IT professionals, this highlights the necessity of applying robust security measures to collaboration tools, similar to those used for email and other attack vectors. As platforms like Teams, Slack, and Zoom become integral to business infrastructure, their compromise becomes a significant security concern.
Ultimately, this incident illustrates the financial and operational risks associated with such breaches, urging a shift towards zero-trust security models that meticulously verify interactions, regardless of the platform.


