{"id":364230,"date":"2025-11-05T17:47:25","date_gmt":"2025-11-05T22:47:25","guid":{"rendered":"https:\/\/tech.co\/?p=364230"},"modified":"2025-11-05T17:47:25","modified_gmt":"2025-11-05T22:47:25","slug":"researchers-microsoft-teams-vulnerabilities","status":"publish","type":"post","link":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities","title":{"rendered":"Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n<\/p><div class=\"verdict-box inform-box\" data-eventcategory=\"verdictbox\" data-component=\"verdict-box\" data-total-positions=\"3\">\n\n <div class=\"verdict-box-wrap inform-box-wrap\">\n <h3 class=\"verdict-box-title\">Key Takeaways<\/h3>\n \n <div class=\"verdict-box-info\">\n<ul>\n<li><strong>The four flaws would have allowed impersonations, message manipulation, and altered notifications.&nbsp;&nbsp;<\/strong><\/li>\n<li><strong>They&rsquo;ve all been patched up already, so these problems are no longer a threat today.<\/strong><\/li>\n<li><strong>Microsoft Teams is used by more than 320 million monthly active users.<\/strong><\/li>\n<\/ul>\n<p>\n<\/p><\/div>\n <\/div>\n\n <div class=\"verdict-box-footer inform-box-buttons\">\n <div class=\"container\">\n <div class=\"row\">\n <\/div>\n <\/div>\n <\/div>\n\n<\/div>\n[vc_column_text css=&rdquo;&rdquo;]\n<p>Impersonating executives, manipulating messages, altering notifications, and forging identities in video chats? You might be a hacker aware of the latest vulnerabilities in <a href=\"https:\/\/tech.co\/web-conferencing\/microsoft-teams-review\"><strong>Microsoft Teams<\/strong><\/a>.<\/p>\n<p>That&rsquo;s according to a new report from Check Point Research that found four different critical flaws in the popular software used by more than 320 million people worldwide.<\/p>\n<p>Don&rsquo;t get too worried, though. The researchers reported it all to Microsoft last year, and all issues have now been successfully addressed and fixed. Here&rsquo;s what to know.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&rdquo;2\/3&Prime;][vc_column_text css=&rdquo;&rdquo;]<\/p>\n<h2>What the Flaws Made Possible<\/h2>\n<p>The potential fallout from all the issues could have been massive. According to Check Point&rsquo;s full <a href=\"https:\/\/research.checkpoint.com\/2025\/microsoft-teams-impersonation-and-spoofing-vulnerabilities-exposed\/\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a>, the real-world risks cover &ldquo;executive impersonation, financial fraud, malware delivery, misinformation campaigns, and disruption of sensitive communications.&rdquo;<\/p>\n<p>But what specifically did they find? Here&rsquo;s the quick summary of how each of the four flaws worked:<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&rdquo;1\/3&Prime;]<\/p><p>&nbsp;<\/p>\n<p style=\"text-align: center\"><a class=\"js-aw-brand-link\" href=\"https:\/\/compare.tech.co\/software-deals-live\/\" data-feed=\"XuPuf49GEEm4y0PaIQDZ0dEjkEf760Vv\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-333457\" src=\"https:\/\/images.tech.co\/wp-content\/uploads\/2024\/06\/18114043\/About-Techco-video.jpg\" alt=\"About Tech.co Video Thumbnail Showing Lead Writer Conor Cawley Smiling Next to Tech.co Logo\" width=\"200\" height=\"200\"><\/a><strong>This just in! View<\/strong><br>\n<strong><a href=\"https:\/\/compare.tech.co\/software-deals-live\/\">the top business tech deals<\/a> for 2026 &#128104;&zwj;&#128187;<br>\n<\/strong><a class=\"js-aw-brand-link\" href=\"https:\/\/compare.tech.co\/software-deals-live\/\" data-feed=\"XuPuf49GEEm4y0PaIQDZ0dEjkEf760Vv\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-348272 aligncenter\" src=\"https:\/\/images.tech.co\/wp-content\/uploads\/2024\/09\/09122654\/ok-1.png\" alt=\"See the list button\" width=\"200\" height=\"85\"><\/a><\/p>\n[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]\n<ul>\n<li><strong>Hackers could<\/strong> <strong>edit Teams messages<\/strong> while avoiding the &ldquo;edited&rdquo; label that&rsquo;s intended to let everyone know if a message has been altered. This can allow them to trick users, or to fake a messaging history.<\/li>\n<li><strong>They could also change message notifications<\/strong>, making them appear to be from another sender. This could be easily used for undetectable phishing attempts.<\/li>\n<li><strong>Bad actors could also edit display names<\/strong> within&nbsp;private chats.<\/li>\n<li><strong>They could even edit caller identities on both video and audio calls<\/strong>.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]<\/p>\n<h2>The Biggest Danger? Executive Impersonation<\/h2>\n<p>Paired with <a href=\"https:\/\/tech.co\/news\/anti-deepfake-law-passes-us-senate\"><strong>AI deepfakes<\/strong><\/a> and other modern hacker technologies, all these flaws definitely open the door for faked messages and complex impersonations.<\/p>\n<p>The biggest potential risk? Executive impersonation and social engineering. Bad actors could have used these flaws to alter messages and caller IDs. As the researchers explained it:<\/p>\n<blockquote><p>&ldquo;In private chats, a malicious guest user could impersonate someone internal, such as a finance department member. Notifications can be spoofed to display a false sender name, preying on the instinct to trust official-looking notifications, potentially from authority figures or top executives.&rdquo; &ndash; Check Point spokesperson<\/p><\/blockquote>\n<p>Their team disclosed all these vulnerabilities to Microsoft back on March 23rd, 2024, and by late October, all vulnerabilities had been fixed.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]<\/p>\n<h2>Staying Safe at Work<\/h2>\n<p>Granted, these types of flaws are concerning even when they have been fixed. The fact that a business software used by hundreds of millions of people could have undermined trust so deeply is troubling.<\/p>\n<p>After all, entirely avoiding social engineering, <strong><a href=\"https:\/\/tech.co\/news\/how-spot-and-avoid-new-microsoft-teams-scam\">scams<\/a><\/strong>, and phishing attacks is impossible even under the best circumstances. We recommend taking plenty of precautions for your own company, from multi-factor authentication to password managers to regular training lessons on the value of checking for spelling errors or unusual activity from internal emails.<\/p>\n<p>When you can&rsquo;t trust your own business software to tell you when a message was edited or who&rsquo;s calling for a video chat, even those defenses start to look shaky. Here&rsquo;s hoping it&rsquo;s all fixed for good.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Think you know when an MS Teams message was edited or who&#8217;s calling for a video chat? Think again.<\/p>\n","protected":false},"author":8412,"featured_media":335429,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"single-sidebar.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-364230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","col-12"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities - Tech.co<\/title>\n<meta name=\"description\" content=\"Think you know when an MS Teams message was edited or who&#039;s calling for a video chat? Think again. These recently-fixed flaws could have tripped you up.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities - Tech.co\" \/>\n<meta property=\"og:description\" content=\"Think you know when an MS Teams message was edited or who&#039;s calling for a video chat? Think again. These recently-fixed flaws could have tripped you up.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities\" \/>\n<meta property=\"og:site_name\" content=\"Tech.co\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-05T22:47:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.tech.co\/wp-content\/uploads\/2021\/12\/02152150\/Microsoft-Teams.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Rowe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdamRRowe\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Rowe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#article\",\"isPartOf\":{\"@id\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities\"},\"author\":{\"name\":\"Adam Rowe\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292\"},\"headline\":\"Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities\",\"datePublished\":\"2025-11-05T22:47:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities\"},\"wordCount\":617,\"image\":{\"@id\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2021\/12\/02152150\/Microsoft-Teams.jpg\",\"keywords\":[\"Big Tech\",\"Privacy and Security\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/tech.co\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities\",\"url\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities\",\"name\":\"Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities - Tech.co\",\"isPartOf\":{\"@id\":\"https:\/\/tech.co\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2021\/12\/02152150\/Microsoft-Teams.jpg\",\"datePublished\":\"2025-11-05T22:47:25+00:00\",\"author\":{\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292\"},\"description\":\"Think you know when an MS Teams message was edited or who's calling for a video chat? Think again. These recently-fixed flaws could have tripped you up.\",\"breadcrumb\":{\"@id\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#primaryimage\",\"url\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2021\/12\/02152150\/Microsoft-Teams.jpg\",\"contentUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2021\/12\/02152150\/Microsoft-Teams.jpg\",\"width\":1920,\"height\":960,\"caption\":\"Microsoft Teams\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tech.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tech.co\/#website\",\"url\":\"https:\/\/tech.co\/\",\"name\":\"Tech.co\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tech.co\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292\",\"name\":\"Adam Rowe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg\",\"caption\":\"Adam Rowe\"},\"description\":\"Adam has been a writer at Tech.co for nine years, covering fleet management and logistics. He has also worked at the logistics newletter Inside Lane, and has worked as a tech writer, blogger and copy editor for more than a decade. He was a Forbes Contributor on the publishing industry, for which he was named a Digital Book World 2018 award finalist. His work has appeared in publications including Popular Mechanics and IDG Connect, and his art history book on 1970s sci-fi, 'Worlds Beyond Time,' was a 2024 Locus Awards finalist. When not working on his next art collection, he's tracking the latest news on VPNs, POS systems, and the future of tech.\",\"sameAs\":[\"https:\/\/x.com\/AdamRRowe\"],\"url\":\"https:\/\/tech.co\/author\/arrowe\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities - Tech.co","description":"Think you know when an MS Teams message was edited or who's calling for a video chat? Think again. These recently-fixed flaws could have tripped you up.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities","og_locale":"en_US","og_type":"article","og_title":"Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities - Tech.co","og_description":"Think you know when an MS Teams message was edited or who's calling for a video chat? Think again. These recently-fixed flaws could have tripped you up.","og_url":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities","og_site_name":"Tech.co","article_published_time":"2025-11-05T22:47:25+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/images.tech.co\/wp-content\/uploads\/2021\/12\/02152150\/Microsoft-Teams.jpg","type":"image\/jpeg"}],"author":"Adam Rowe","twitter_card":"summary_large_image","twitter_creator":"@AdamRRowe","twitter_misc":{"Written by":"Adam Rowe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#article","isPartOf":{"@id":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities"},"author":{"name":"Adam Rowe","@id":"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292"},"headline":"Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities","datePublished":"2025-11-05T22:47:25+00:00","mainEntityOfPage":{"@id":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities"},"wordCount":617,"image":{"@id":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#primaryimage"},"thumbnailUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2021\/12\/02152150\/Microsoft-Teams.jpg","keywords":["Big Tech","Privacy and Security"],"articleSection":["News"],"inLanguage":"en-US","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/tech.co\/#organization"}},{"@type":"WebPage","@id":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities","url":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities","name":"Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities - Tech.co","isPartOf":{"@id":"https:\/\/tech.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#primaryimage"},"image":{"@id":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#primaryimage"},"thumbnailUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2021\/12\/02152150\/Microsoft-Teams.jpg","datePublished":"2025-11-05T22:47:25+00:00","author":{"@id":"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292"},"description":"Think you know when an MS Teams message was edited or who's calling for a video chat? Think again. These recently-fixed flaws could have tripped you up.","breadcrumb":{"@id":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#primaryimage","url":"https:\/\/images.tech.co\/wp-content\/uploads\/2021\/12\/02152150\/Microsoft-Teams.jpg","contentUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2021\/12\/02152150\/Microsoft-Teams.jpg","width":1920,"height":960,"caption":"Microsoft Teams"},{"@type":"BreadcrumbList","@id":"https:\/\/tech.co\/news\/researchers-microsoft-teams-vulnerabilities#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tech.co\/"},{"@type":"ListItem","position":2,"name":"Researchers Just Revealed 4 Big Microsoft Teams Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/tech.co\/#website","url":"https:\/\/tech.co\/","name":"Tech.co","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tech.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292","name":"Adam Rowe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tech.co\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg","caption":"Adam Rowe"},"description":"Adam has been a writer at Tech.co for nine years, covering fleet management and logistics. He has also worked at the logistics newletter Inside Lane, and has worked as a tech writer, blogger and copy editor for more than a decade. He was a Forbes Contributor on the publishing industry, for which he was named a Digital Book World 2018 award finalist. His work has appeared in publications including Popular Mechanics and IDG Connect, and his art history book on 1970s sci-fi, 'Worlds Beyond Time,' was a 2024 Locus Awards finalist. When not working on his next art collection, he's tracking the latest news on VPNs, POS systems, and the future of tech.","sameAs":["https:\/\/x.com\/AdamRRowe"],"url":"https:\/\/tech.co\/author\/arrowe"}]}},"_links":{"self":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts\/364230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/users\/8412"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/comments?post=364230"}],"version-history":[{"count":0,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts\/364230\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/media\/335429"}],"wp:attachment":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/media?parent=364230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}