Skip to main content
Mallory

A0Backdoor Campaign Abuses Microsoft Teams and Quick Assist for Initial Access

initial-access-methodvoice-social-engineeringremote-access-implantcommand-and-control-methodransomware-group-operation
Updated March 21, 2026 at 05:49 AM2 sources
Share:
A0Backdoor Campaign Abuses Microsoft Teams and Quick Assist for Initial Access

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

BlueVoyant researchers identified a social-engineering campaign in which operators linked to Blitz Brigantine / Storm-1811 / STAC5777, a cluster associated with the Black Basta ecosystem, impersonate IT support over Microsoft Teams after overwhelming targets with spam email. Victims are persuaded to launch Quick Assist, giving the attackers remote access that is then used to deploy A0Backdoor through digitally signed MSI packages masquerading as legitimate Microsoft software such as Microsoft Teams and CrossDeviceService. The activity has targeted organizations in sectors including finance and healthcare, and the use of multiple code-signing certificates suggests the operators prepared the toolchain well before the observed intrusions.

Once installed, A0Backdoor fingerprints the host and communicates with operators using DNS tunneling over public resolvers, helping the malware blend into normal traffic while maintaining persistence and command-and-control. The reporting is substantive threat intelligence rather than promotional or advisory content, and the only other mention of the same event is a newsletter item that cites the A0Backdoor research as one entry among many malware stories. Other references in the set cover unrelated vulnerabilities, policy developments, AI security issues, phishing, ransomware trends, and separate malware campaigns, and do not describe this specific Teams-and-Quick-Assist intrusion chain.

Timeline

  1. Mar 16, 2026

    BlueVoyant discloses A0Backdoor campaign details and mitigations

    BlueVoyant publicly reported the A0Backdoor social-engineering campaign, attributing it to Blitz Brigantine and describing its abuse of Microsoft Teams and Quick Assist. The disclosure included technical details on the malware and recommendations such as restricting Quick Assist, limiting external Teams access, and monitoring for suspicious MSI and DNS activity.

  2. Feb 28, 2026

    Attackers deploy A0Backdoor via signed MSI and DLL sideloading

    During the campaign, the operators used digitally signed MSI installers disguised as Microsoft software and a malicious hostfxr.dll for DLL sideloading to install the newly identified A0Backdoor. The malware fingerprints infected systems and uses DNS tunneling and DNS MX queries over public resolvers to communicate while evading detection.

  3. Aug 1, 2025

    Blitz Brigantine begins Teams and Quick Assist intrusion campaign

    A threat group tracked as Blitz Brigantine, Storm-1811, and STAC5777 began targeting finance and healthcare organizations using spam-email flooding, fake IT support contact over Microsoft Teams, and Windows Quick Assist to gain access. The activity is linked to the Black Basta ransomware ecosystem and was active from at least August 2025.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Malware

Affected Products

Related Stories

Microsoft Teams Social Engineering Abuses Quick Assist to Deploy A0Backdoor

Microsoft Teams Social Engineering Abuses Quick Assist to Deploy A0Backdoor

A social-engineering campaign targeting employees at **financial and healthcare** organizations is abusing **Microsoft Teams** chats/calls to trick users into granting remote access via *Windows Quick Assist*, enabling deployment of a newly identified malware family dubbed **A0Backdoor**. The activity begins with **email bombing** (flooding inboxes with spam) followed by an attacker impersonating internal IT over Teams, offering help and then persuading the victim to start a Quick Assist session; the tradecraft overlaps with tactics previously attributed to **Blitz Brigantine / Storm-1811**, which Microsoft has linked to **Black Basta**-associated operations. Post-access, the actor deploys **digitally signed MSI installers** masquerading as Teams-related components and *CrossDeviceService* (associated with Windows *Phone Link*), sometimes delivered via **tokenized links** from Microsoft personal cloud storage to appear trustworthy and hinder collection. BlueVoyant reported the installers drop files into user `AppData` paths that mimic legitimate Microsoft locations and use **DLL sideloading** (e.g., a malicious `hostfxr.dll`) to execute an in-memory loader that decrypts shellcode, performs sandbox checks, and ultimately extracts and runs **A0Backdoor** (using **AES**-encrypted payloads and a **SHA-256**-derived key), with anti-analysis behavior including excessive thread creation intended to disrupt debugging.

3 days ago
Microsoft Teams Vishing Used to Gain Remote Access and Deploy Malware

Microsoft Teams Vishing Used to Gain Remote Access and Deploy Malware

Attackers used **Microsoft Teams** to impersonate IT or helpdesk staff and socially engineer employees into granting access or executing malicious actions, turning collaboration tooling and trusted support workflows into the initial access vector. One report describes a compromise at an Italy-based consumer services company where a Teams meeting invite and screen sharing session led the victim to run a staged **PowerShell** chain that deployed **PhantomBackdoor**, a multi-stage **WebSocket-based** backdoor associated with earlier spear-phishing activity. The observed sequence included post-call PowerShell execution, device reconnaissance, and establishment of WebSocket command-and-control. A second report describes a similar **vishing** intrusion in which a threat actor posing as support staff called employees through Teams and, after multiple attempts, convinced one user to grant remote access through **Quick Assist**. The attacker then directed the victim to a spoofed credential-harvesting site, used a malicious **MSI** and sideloaded **DLL** to launch follow-on payloads, and established outbound C2. While the malware families and exact post-compromise chains differ, both accounts document the same operational pattern: **Teams-based social engineering**, abuse of legitimate remote assistance or user-guided execution, credential theft or payload staging, and transition to hands-on intrusion activity inside a corporate environment.

1 months ago
Multiple APT and malware campaigns abusing phishing, cloud services, and signed binaries

Multiple APT and malware campaigns abusing phishing, cloud services, and signed binaries

Reporting across multiple research teams described a surge of distinct, ongoing intrusion campaigns rather than a single unified incident. **Check Point** reported on **Silver Dragon**, a Chinese-aligned activity cluster assessed as operating under the broader **APT41** umbrella, targeting organizations in **Southeast Asia and Europe** (notably government) via exploitation of public-facing servers and phishing, then deploying **Cobalt Strike**, **DNS tunneling**, and a new Google Drive–based backdoor (**GearDoor**) alongside custom tools (**SSHcmd** and **SliverScreen**) for remote access and screen capture. **Microsoft** detailed separate February 2026 phishing campaigns by an unknown actor that used meeting/invoice-style lures and **EV code-signed** malware (certificate issued to **TrustConnect Software PTY LTD**) masquerading as common workplace apps (e.g., `msteams.exe`, `adobereader.exe`, `zoomworkspace.clientsetup.exe`) to install legitimate **RMM** tooling (**ScreenConnect**, **Tactical RMM**, **Mesh Agent**) for persistent access and lateral movement. Other reporting highlighted additional, unrelated campaigns and tradecraft: **ClearSky** described a Russian-aligned operation targeting **Ukraine** using a phishing-delivered ZIP/HTA chain that drops a .NET loader (**BadPaw**) and backdoor (**MeowMeow**) with **.NET Reactor** obfuscation, parameter-gated execution, and sandbox/tooling checks (with low-confidence linkage to **APT28**). **Cofense**-reported activity (via SC Media) showed phishing that weaponizes **Windows File Explorer + WebDAV** using URL/LNK shortcuts to pull payloads (notably **AsyncRAT**, **XWorm**, **DcRAT**) and infrastructure including **Cloudflare Tunnel** domains hosting WebDAV servers. **Cisco Talos**-reported **Dohdoor** activity (UAT-10027) targeted US **education and healthcare**, using PowerShell→batch→DLL sideloading via legitimate executables (e.g., `Fondue.exe`, `mblctr.exe`, `ScreenClippingHost.exe`) and **DNS-over-HTTPS** to Cloudflare for C2 discovery and tunneling. Separately, **Zscaler** reported **ScarCruft**’s *Ruby Jumper* campaign using **Zoho WorkDrive** for C2 and removable media components to reach air-gapped systems, while another Zscaler report analyzed **Dust Specter** targeting Iraqi government officials with password-protected RAR delivery and modular implants. **Qianxin XLab** assessed sanctioned infrastructure provider **Funnull** resurfacing to support scam/criminal supply chains and potential **MacCMS**-related supply-chain activity, and **F5 Labs** summarized **APT42**’s **TAMECAT** PowerShell backdoor focused on Edge/Chrome credential theft with C2 over Telegram/Discord/HTTPS and specific file/hash indicators. (A separate Help Net Security item on a Microsoft Defender onboarding tool is product/administrative news and not part of the threat-campaign reporting.)

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.