
Microsoft Teams New Feature to Flag Suspicious One-to-One Calls
Urgent: Microsoft Teams Bolsters Defenses Against Voice Phishing with New Reporting Feature
The landscape of cyber threats is continuously adapting, and a growing concern for organizations is the rise of voice-based phishing and scams. As the use of collaboration platforms like Microsoft Teams skyrockets, so too does the potential for attackers to exploit these channels. Recognizing this critical shift, Microsoft is rolling out a vital new security feature designed to empower users and fortify organizational defenses: the ability to flag suspicious one-to-one calls directly within Teams.
The Escalating Threat of Voice Phishing (Vishing)
Traditional phishing emails have long been a primary attack vector, but attackers are increasingly leveraging voice calls to bypass email security filters and exploit human trust. This tactic, known as “vishing,” can be highly effective. Attackers impersonate IT support, executives, or even government agencies, using social engineering to trick victims into revealing sensitive information, clicking malicious links, or granting unauthorized access. The intimate nature of a voice call often makes it more convincing than a text-based communication, leading to a higher success rate for sophisticated attackers.
The proliferation of Microsoft Teams for internal and external communication has unfortunately opened a new and attractive avenue for these types of attacks. As organizations rely more on Teams for daily operations, attackers are adapting their strategies to integrate voice-based scams directly into this trusted platform.
Introducing the “Report a Call” Feature in Microsoft Teams
To combat this evolving threat, Microsoft is implementing a crucial security enhancement: a “Report a Call” button within Teams. This feature will allow users to flag suspicious one-to-one calls directly from their call history. This proactive measure empowers the end-user, transforming them into an active participant in their organization’s security posture. When a user encounters a call that feels off β perhaps an unsolicited request for credentials, an unusual tone, or an outright impersonation β they can now immediately report it.
This capability is a significant step forward as it provides a direct feedback loop to security teams. Currently, reporting suspicious activity often involves navigating to a separate email or ticketing system, which can be cumbersome and lead to delays. By integrating the reporting mechanism directly into the communication platform, Microsoft aims to streamline the process, enabling faster detection and response to potential voice-based threats.
How the “Report a Call” Feature Works
While specific implementation details typically evolve, the core functionality is straightforward: users will find a new option, likely within the call details or history pane, to report the call. This action will presumably trigger an alert to designated security administrators within the organization. These administrators can then investigate the reported call, analyze its context, and take appropriate action, such as blocking the caller, issuing company-wide alerts, or initiating further forensic analysis.
This user-driven reporting mechanism augments existing security layers by providing crucial real-time intelligence from the front lines β the users themselves. Itβs an acknowledgment that while technical controls are essential, human vigilance remains a critical component of a robust cybersecurity strategy.
Remediation Actions and Best Practices for Organizations
While the new “Report a Call” feature is a powerful addition, it should be part of a broader security strategy. Organizations must implement comprehensive measures to protect against voice phishing and other forms of social engineering.
- Employee Training: Regularly educate employees on the signs of vishing attacks. Train them to be suspicious of unsolicited calls, especially those requesting personal information, passwords, or access to systems. Emphasize verification processes for any sensitive requests.
- Multi-Factor Authentication (MFA): Implement MFA across all critical systems. Even if an attacker obtains credentials via vishing, MFA provides an additional layer of defense.
- Zero Trust Principles: Adopt a Zero Trust security model, which dictates that no user or device should be trusted by default, regardless of whether they are inside or outside the network perimeter. Always verify.
- Incident Response Plan: Develop and regularly test a clear incident response plan for reporting and handling suspicious calls or potential security breaches. Ensure employees know precisely how to use the new “Report a Call” feature and whom to contact internally.
- Technical Call Control Measures: Explore and implement call control features available within Teams and your telephony infrastructure, such as blocking unknown numbers or implementing call routing policies.
- Simulated Phishing/Vishing Campaigns: Conduct internal phishing and vishing simulations to assess employee awareness and identify areas for further training. These exercises can help employees recognize and report real threats.
The Future of Teams Security
This new “Report a Call” feature is a testament to Microsoft’s ongoing commitment to enhancing security within its pervasive Teams platform. As communication methods evolve, so too must the security measures designed to protect them. By empowering users with a simple, integrated reporting tool, Microsoft is taking a crucial step in creating a more resilient and secure environment for voice communications within organizations.
While there isn’t a specific CVE assigned to the lack of this feature or specific vishing attacks through Teams (as attacks leverage social engineering primarily), the introduction of this feature addresses a growing attack vector that could indirectly lead to compromises such as phishing campaigns documented under threat intelligence advisories or potential account takeovers. Organizations relying heavily on Microsoft Teams for internal and external communication should welcome this new security capability and integrate it into their broader security awareness and incident response strategies.


