Microsoft Teams Social Engineering Abuses Quick Assist to Deploy A0Backdoor
A social-engineering campaign targeting employees at financial and healthcare organizations is abusing Microsoft Teams chats/calls to trick users into granting remote access via Windows Quick Assist, enabling deployment of a newly identified malware family dubbed A0Backdoor. The activity begins with email bombing (flooding inboxes with spam) followed by an attacker impersonating internal IT over Teams, offering help and then persuading the victim to start a Quick Assist session; the tradecraft overlaps with tactics previously attributed to Blitz Brigantine / Storm-1811, which Microsoft has linked to Black Basta-associated operations.
Post-access, the actor deploys digitally signed MSI installers masquerading as Teams-related components and CrossDeviceService (associated with Windows Phone Link), sometimes delivered via tokenized links from Microsoft personal cloud storage to appear trustworthy and hinder collection. BlueVoyant reported the installers drop files into user AppData paths that mimic legitimate Microsoft locations and use DLL sideloading (e.g., a malicious hostfxr.dll) to execute an in-memory loader that decrypts shellcode, performs sandbox checks, and ultimately extracts and runs A0Backdoor (using AES-encrypted payloads and a SHA-256-derived key), with anti-analysis behavior including excessive thread creation intended to disrupt debugging.
Timeline
Apr 18, 2026
Microsoft details lateral movement and Rclone data exfiltration in the intrusion playbook
Microsoft reported that after gaining remote access, the operators conduct reconnaissance, use trusted signed applications for DLL sideloading, move laterally over WinRM toward high-value systems such as domain controllers, and exfiltrate targeted data with Rclone to external cloud storage. The company framed the activity as a human-operated intrusion chain centered on cross-tenant helpdesk impersonation and abuse of legitimate administrative workflows.
Mar 9, 2026
BlueVoyant links the campaign to Black Basta-associated tradecraft evolution
BlueVoyant reported that the activity overlaps with Black Basta-associated tactics and assessed with moderate-to-high confidence that it represents an evolution of that tradecraft after the group's apparent dissolution following leaked internal chat logs. The report also noted new elements including signed MSIs, the A0Backdoor payload, and DNS MX-based command-and-control.
Mar 9, 2026
Attackers deploy signed MSI installers and sideload A0Backdoor after remote access
After obtaining remote access, the attackers deliver digitally signed MSI installers disguised as Microsoft Teams components or the legitimate CrossDeviceService tool, then abuse DLL sideloading with Microsoft-signed binaries and a malicious hostfxr.dll loader. The loader decrypts and launches a newly identified memory-resident payload called A0Backdoor.
Jan 1, 2024
Teams phishing campaign uses email bombing and fake IT chats to gain Quick Assist access
Since 2024, attackers have used a social-engineering playbook in which targets are flooded with spam emails and then contacted over Microsoft Teams by actors posing as internal IT staff, who persuade them to start a Windows Quick Assist remote session. The campaign has targeted employees in financial and healthcare organizations.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Related Entities
Threat Actors
Organizations
Sources
5 more from sources like microsoft security blog, scworld, techrepublic com security, cyber security news and bleeping computer
Related Stories

A0Backdoor Campaign Abuses Microsoft Teams and Quick Assist for Initial Access
**BlueVoyant researchers identified a social-engineering campaign** in which operators linked to **Blitz Brigantine / Storm-1811 / STAC5777**, a cluster associated with the **Black Basta** ecosystem, impersonate IT support over **Microsoft Teams** after overwhelming targets with spam email. Victims are persuaded to launch **Quick Assist**, giving the attackers remote access that is then used to deploy **A0Backdoor** through digitally signed MSI packages masquerading as legitimate Microsoft software such as *Microsoft Teams* and *CrossDeviceService*. The activity has targeted organizations in sectors including **finance** and **healthcare**, and the use of multiple code-signing certificates suggests the operators prepared the toolchain well before the observed intrusions. Once installed, **A0Backdoor** fingerprints the host and communicates with operators using **DNS tunneling** over public resolvers, helping the malware blend into normal traffic while maintaining persistence and command-and-control. The reporting is substantive threat intelligence rather than promotional or advisory content, and the only other mention of the same event is a newsletter item that cites the A0Backdoor research as one entry among many malware stories. Other references in the set cover unrelated vulnerabilities, policy developments, AI security issues, phishing, ransomware trends, and separate malware campaigns, and do not describe this specific Teams-and-Quick-Assist intrusion chain.
1 months ago
Microsoft Teams Vishing Used to Gain Remote Access and Deploy Malware
Attackers used **Microsoft Teams** to impersonate IT or helpdesk staff and socially engineer employees into granting access or executing malicious actions, turning collaboration tooling and trusted support workflows into the initial access vector. One report describes a compromise at an Italy-based consumer services company where a Teams meeting invite and screen sharing session led the victim to run a staged **PowerShell** chain that deployed **PhantomBackdoor**, a multi-stage **WebSocket-based** backdoor associated with earlier spear-phishing activity. The observed sequence included post-call PowerShell execution, device reconnaissance, and establishment of WebSocket command-and-control. A second report describes a similar **vishing** intrusion in which a threat actor posing as support staff called employees through Teams and, after multiple attempts, convinced one user to grant remote access through **Quick Assist**. The attacker then directed the victim to a spoofed credential-harvesting site, used a malicious **MSI** and sideloaded **DLL** to launch follow-on payloads, and established outbound C2. While the malware families and exact post-compromise chains differ, both accounts document the same operational pattern: **Teams-based social engineering**, abuse of legitimate remote assistance or user-guided execution, credential theft or payload staging, and transition to hands-on intrusion activity inside a corporate environment.
1 months ago
Phishing Campaigns Delivering Malware via Disguised, Signed Installers and Malicious Attachments
Security researchers reported active phishing activity targeting enterprise users by impersonating routine workplace workflows (e.g., meeting invites, invoices, and document notifications) to trick recipients into running malware. One campaign used executables masquerading as *Microsoft Teams*, *Zoom*, and *Adobe Acrobat Reader* installers (e.g., `msteams.exe`, `zoomworkspace.clientsetup.exe`, `adobereader.exe`, `invite.exe`) that appeared trustworthy because they were **digitally signed** with an Extended Validation (EV) certificate issued to **TrustConnect Software PTY LTD**. Microsoft Defender telemetry attributed the activity to an unknown threat actor and assessed the approach as a deliberate, multi-wave effort designed to bypass user suspicion and basic security controls. After execution, the signed malware deployed **remote monitoring and management (RMM)** tooling—reported examples include **ScreenConnect**, **Tactical RMM**, and **Mesh Agent**—to establish persistent remote access and enable follow-on actions across affected environments. Separately, reporting also highlighted phishing lures distributing **malicious ISO attachments** embedded in job application/resumé-themed emails, reinforcing that attackers continue to rely on socially engineered business processes (recruiting and HR workflows in particular) to deliver initial payloads and gain a foothold.
1 months ago