[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f9M-qqDI7Xb5FBdaNoP9by4k2vYqBWbbjRhiDPAYiTxM":3},{"items":4,"nextOffset":40,"hasMore":41},[5],{"id":6,"title":7,"slug":8,"url":9,"summary":10,"ai_summary":11,"parent_article_id":12,"relation_type":12,"image_url":13,"verify_count":14,"avg_score":12,"score_count":14,"published_at":15,"ingested_at":16,"source":17,"category":21,"tags":25,"ioc_count":38,"has_awareness_lesson":39,"awareness_lesson_id":12},"31f8929b-55a0-40d2-ac68-2f2f8273f283","KongTuke hackers now use Microsoft Teams for corporate breaches","kongtuke-hackers-now-use-microsoft-teams-for-corporate-breaches-1e80b9","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fkongtuke-hackers-now-use-microsoft-teams-for-corporate-breaches\u002F","Initial access broker KongTuke has moved to Microsoft Teams for social engineering attacks, taking as little as five minutes to gain persistent access to corporate networks. [...]","Initial access broker KongTuke has shifted tactics to use Microsoft Teams for social engineering attacks against corporate networks, impersonating IT staff to trick users into running malicious PowerShell commands. The attacks deliver ModeloRAT, a Python-based remote access trojan that establishes persistent access with enhanced C2 resilience, multiple backdoor channels, and sophisticated persistence mechanisms designed to survive standard cleanup procedures. The campaign has been active since at least April 2026, with the threat actor rotating through multiple Microsoft 365 tenants to evade detection and blocking.",null,"https:\u002F\u002Fwww.bleepstatic.com\u002Fcontent\u002Fhl-images\u002F2026\u002F02\u002F17\u002FMicrosoft-Teams.jpg",0,"2026-05-14T12:12:40+00:00","2026-05-14T14:00:07.396462+00:00",{"id":18,"url":19,"name":20},"0a97efc1-021e-4aee-ae8f-b1643b35de46","https:\u002F\u002Fwww.bleepingcomputer.com\u002Ffeed\u002F","BleepingComputer",{"id":22,"icon":12,"name":23,"slug":24,"description":12},"2e06f76c-d5b9-4f54-9eef-4d3447b10730","Breaches","breaches",[26,30,34],{"id":27,"slug":28,"name":29},"2c8f44d4-b56e-47cf-9677-04f22c9ee78d","identity-access","Identity & Access",{"id":31,"slug":32,"name":33},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","malware","Malware",{"id":35,"slug":36,"name":37},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","threat-intelligence","Threat Intelligence",2,false,1,true]