Microsoft Teams users are being warned about a sophisticated phishing scam that impersonates the platform’s customer service to steal login credentials and financial information. The attack, which has been circulating since early 2025, uses fake notifications that mimic legitimate Microsoft Teams alerts, often claiming users have missed a meeting or received an urgent message from a colleague. These messages are designed to create a sense of urgency, prompting recipients to click on malicious links that lead to counterfeit login pages nearly identical to the real Microsoft 365 portal.
According to cybersecurity researchers at Total Defense, the scam relies heavily on familiar branding and social engineering tactics. The fraudulent emails frequently include official-looking Microsoft logos, color schemes, and language that mirrors genuine Teams communications. What makes these attacks particularly dangerous is their use of urgency-driven language—phrases like “You missed a meeting!” or “Action required: View message now”—which exploit users’ habitual responses to workplace notifications. Once clicked, the embedded links redirect victims to phishing sites hosted on compromised domains, where attackers harvest usernames, passwords, and sometimes multi-factor authentication tokens.
The threat is not limited to email. Variants of this scam have also been observed through fake calendar invites sent via Outlook, a tactic highlighted in a May 2025 MailGuard report. These .ics files automatically populate the recipient’s calendar with a blocked time slot labeled as a “Teams meeting,” reinforcing the illusion of legitimacy and increasing pressure to act quickly. When users open the invite, they are often prompted to download an attachment or follow a link to resolve a fabricated scheduling conflict, which instead triggers the download of malware or leads to a credential-harvesting page.
Microsoft has acknowledged the rise in Teams-targeted phishing campaigns and advises users to verify the sender’s address carefully, noting that legitimate communications from Microsoft will always approach from domains ending in @microsoft.com or @MicrosoftTeams.com. The company recommends enabling multi-factor authentication, reporting suspicious messages through the “Report phishing” feature in Outlook, and never entering login details on pages accessed via unsolicited email links. Users are encouraged to access Teams directly through the official app or website rather than clicking links in messages.
How the Fake Customer Service Scam Operates
The core of this phishing tactic involves impersonating Microsoft Teams customer support to trick users into divulging sensitive information. Attackers send messages claiming there is an issue with the user’s account—such as a failed login attempt, a subscription renewal problem, or a security alert—that requires immediate attention. These messages often include a phone number or live chat link labeled as “official Microsoft support,” which instead connects victims to fraudsters posing as facilitate desk agents.
Once engaged, the fake support representative may request remote access to the user’s device under the guise of troubleshooting, or ask for verification codes sent via SMS or authenticator apps. In some cases, they guide users to a fake Microsoft portal designed to capture credentials in real time. This method, known as “vishing” (voice phishing) when conducted over the phone, or “smishing” when via SMS, has become increasingly prevalent as attackers move beyond email-only tactics to exploit multiple communication channels.

Cybersecurity firm BrainStomp documented a similar scheme in early 2025 where attackers used fake calendar invites to create urgency, then followed up with a phone call pretending to be Microsoft billing support. The combination of a fabricated meeting reminder and a live voice interaction significantly increased the success rate of the scam, as users were more likely to trust a human-sounding representative who referenced specific details from the fake invite.
To defend against these hybrid attacks, experts recommend never granting remote access to unsolicited support requests and verifying any support contact through official Microsoft channels. Users should also be wary of any request for authentication codes, as legitimate Microsoft representatives will never ask for these codes under any circumstances. All official support interactions should be initiated by the user through the verified Microsoft Support website or the Teams app’s built-in help feature.
Protecting Yourself and Your Organization
Organizations using Microsoft 365 are advised to implement layered security measures to reduce the risk of successful phishing attempts. This includes configuring email filtering policies to flag messages with suspicious links or attachments, enabling anti-phishing protections in Microsoft Defender for Office 365, and conducting regular security awareness training that simulates real-world Teams-based phishing scenarios. Training should emphasize checking sender addresses, hovering over links to view true destinations, and reporting suspicious messages rather than engaging with them.
Individual users can strengthen their protection by turning on passwordless authentication methods such as Windows Hello or FIDO2 security keys, which are resistant to credential theft. Keeping the Teams and Outlook applications updated ensures protection against known vulnerabilities that attackers might exploit. Reviewing account sign-in activity regularly through the Microsoft account portal can help detect unauthorized access early.
If a user suspects they have fallen victim to a Teams phishing scam, they should immediately change their password, revoke any active sessions, and notify their IT department or Microsoft Support through official channels. Monitoring financial accounts and enabling credit alerts are also prudent steps if payment information may have been compromised.
Official Guidance and Resources
Microsoft maintains a dedicated phishing awareness page that outlines common tactics used in attacks targeting its products, including Teams. The company also provides a guide to configuring anti-phishing policies in Microsoft 365 for administrators seeking to harden their environments.

For real-time threat intelligence, the Microsoft Threat Protection service integrates signals from Defender for Office 365, Identity, and Cloud Apps to detect and block phishing attempts across email, identities, and cloud workloads. Users can also report suspicious emails directly to Microsoft using the “Report message” add-in for Outlook or by forwarding phishing attempts to [email protected].
Staying informed through trusted cybersecurity sources such as the Cybersecurity and Infrastructure Security Agency (CISA) and following official Microsoft security blogs remains one of the most effective ways to recognize evolving threats. As attackers continue to refine their impersonation techniques, vigilance and verification before action remain the best defenses against falling for fake Microsoft Teams customer service scams.
If you’ve encountered a suspicious message claiming to be from Microsoft Teams support, sharing your experience can help others recognize similar attempts. Consider commenting below or sharing this article to spread awareness about these ongoing threats.