Thecyber securitycompany has seen thousands of these attacks per month.
This will then install DLL files and create shortcut links to self-administer.
Alternatively, the threat actors can also compromise an email address and use that to access Teams.
That means they will know what malware will bypass existing protections.
Further, many email security solutions do not offer robust protection for Teams, reads theanalysispublished by Avanan.
Because of the unfamiliarity with the Teams platform, many will just trust and approve the requests.
source: www.techworm.net