Het scenario
A developer at a 400-person Dutch fintech opens Slack on Monday morning to a DM from someone whose profile says 'Robert van der Berg — Platform Engineering' with their actual office in the Amsterdam timezone. The message says 'hey, IT asked me to send around the new MFA portal — can you log in once today so we can confirm migration is working?' followed by a link to mfa-portal.fintech-amsterdam.com — a domain that looks plausibly internal. The developer has been with the company three months, doesn't yet know everyone in Platform Engineering, and asks 'is this safe?'. The reply comes within 18 seconds: 'yes, IT will send the same notice in email later but they wanted us to test the link first since you're in the dev rotation'. The developer clicks, sees a Microsoft-styled login, signs in, completes MFA. Within four minutes the attacker — who had earlier compromised a different employee's account via smishing and was using it to send the Slack DMs as 'Robert' — has the developer's session cookie via the AiTM kit behind the fake portal, has registered a new authenticator app on the developer's account, has dropped an OAuth app, and is pivoting into the source code repositories. The fake portal looked correct. The Slack message came from a 'colleague'. There was no email to suspect.
Hoe de aanval werkt
Chat-platform phishing leverages a structural trust gap. Users built years of suspicion habits around email — checking domains, hovering over links, looking for grammar errors. Chat platforms feel internal-by-default, so the same suspicion does not kick in. The 2026 attack patterns split into three groups. The first is compromised-internal-account broadcasts: the attacker has access to one employee's account (via smish, AiTM, OAuth grant, etc.) and uses it to phish coworkers laterally. The DM comes from a trusted person, with their real profile photo and prior message history visible. The second is external guest-channel infiltration: many Slack and Teams deployments allow external guests in shared channels for collaboration. The attacker joins as a guest (sometimes via a previously compromised partner organisation), participates plausibly for days or weeks, then drops a payload or starts targeted DMs. The third is impersonation in cross-tenant Teams chat: Microsoft Teams allows external chat with anyone in any tenant unless restricted; attackers create new tenants with display names matching a real colleague or executive and DM staff who do not realise the message is from an external tenant. MITRE ATT&CK techniques: T1566 (Phishing), T1078.004 (Valid Accounts: Cloud Accounts), T1199 (Trusted Relationship), T1098.001 (Account Manipulation). Defence is technical (restrict external-tenant chat in Teams, restrict Slack external connections, alert on new OAuth apps and inbox rules) and cultural (treat chat messages requesting credential or sensitive actions with the same suspicion as email).
Waar je op moet letten
- DMs requesting login actions, MFA approvals, credential resets, or financial decisions — regardless of how internal they look
- External-marked badge in Teams DMs (Microsoft now adds an 'EXTERNAL' label on cross-tenant chats — read it before responding)
- External-guest status in Slack (the 'GUEST' or 'EXTERNAL' badge near the user's name)
- Sudden behavioural shifts from a known colleague — different tone, urgent requests, off-process asks, refusal to switch to email or in-person verification
- Links to internal-looking domains you do not recognise as part of your normal IdP or tooling — verify before clicking
- DMs from accounts with familiar names but missing prior chat history with you (real coworker DMs usually have a thread; a fresh DM with no history is worth a second thought)
- App-install or webhook-add prompts from a chat colleague — these grant API-level access to channel content
- Cross-tenant message-extension or bot-app prompts in Teams that mimic legitimate internal tools
Wat te doen
- Treat every DM requesting a login or sensitive action with the same suspicion you would apply to an email — chat is not saferHover over links, check domains, ask 'why is IT contacting me in Slack instead of an official channel?' before complying.
- Verify out-of-band before taking action on any unusual chat requestWalk to the person's desk, video-call them on a separate channel, or check via your IdP portal whether the claimed task is genuine.
- Watch for the EXTERNAL or GUEST badge — and never authenticate to a 'colleague' marked externalMicrosoft and Slack both mark cross-tenant or guest accounts visibly. Read the badge before reading the message.
- Report unfamiliar DMs requesting credentials to securityInternal-source phishing means an account is likely compromised. Security needs the signal to isolate and investigate.
- Do not install chat apps, message-extensions or webhooks without IT reviewOnce installed, chat apps can read channel content, post as users, and pivot to other tools. Treat them like SaaS apps.
- If a Slack/Teams admin role is offered to you that you did not request, declineAttackers escalate by tricking targets into accepting workspace-admin privileges. Admin role = control over the platform.
Verdediging — voor IT en beleid
Technische controles
- Microsoft Teams: restrict external-tenant chat to allowed-domain list only — Teams admin centre → External access. Default-open settings are a documented attack surface.
- Slack: restrict guest accounts to specific channels, require IT approval for new external connections, disable email/Slack-Connect invites without admin approval
- Defender for Cloud Apps / Slack EKM with alerting on: new external-DM threads, new app installs, new webhook creation, new OAuth grants from chat platforms
- Identity-bound MFA (FIDO2 / passkeys) — same control as email-phishing defence; defeats credentials-stolen-via-chat link pattern
- DLP on chat platforms for outbound disclosure of credentials, OTPs, IBANs, contract numbers
- Bot-and-app inventory review quarterly — every installed chat app has a documented business owner; orphaned apps get removed
- Visible external-badge enforcement (default in modern Slack/Teams; ensure it is not suppressed)
Beleidscontroles
- Written policy: IT will not deliver MFA changes, password resets or credential requests via chat. Any such message in chat is a phishing attempt.
- Written policy: payment instructions, credential disclosures and supplier banking changes are not authorised via chat — must go through workflow
- Onboarding includes a 'chat is not safer than email' segment — explicitly named
- Periodic guest-account review — every external user in your Slack or Teams workspace is reviewed against business need quarterly; orphans removed
- Documented incident playbook for compromised-account chat broadcasts — disconnect sessions, revoke OAuth, audit messages sent, notify the team
Trainingsfrequentie
Pair email-phishing simulation with a quarterly chat-phishing exercise — most enterprise platforms now support training simulators. Track reporting rate of unfamiliar DMs. The cultural shift takes longer than email training because the trust default is higher; consistent quarterly reinforcement matters.
Korte check
Vijf vragen. Antwoorden en toelichting verschijnen na inzenden.
- Q1.
A colleague DMs you in Slack with a link to 'the new IT MFA portal' and asks you to log in to confirm migration. The link domain looks vaguely internal. What is your correct action?
- Q2.
In Microsoft Teams, what does an 'EXTERNAL' badge near a user's name mean?
- Q3.
An attacker compromises one employee account and starts DMing colleagues from inside Slack. Why is this attack so effective?
- Q4.
A Teams chat app prompts you to install with 'read all messages in your channels' permission. What is the right response?
- Q5.
Which technical control most directly reduces external-tenant Teams chat phishing in 2026?
Bronnen & verdere lectuur
- Microsoft — Teams external collaboration security guidance[primary]
- Slack — Guest accounts and Connect security model[primary]
- MITRE ATT&CK — T1199 Trusted Relationship[primary]
- NCSC-NL — Samenwerkingsplatformen en chat-beveiliging[primary]
- Krebs on Security — Uber 2022 / Slack-pivot coverage[secondary]
- Mandiant — UNC3944 / Scattered Spider chat-pivot tradecraft[secondary]