Skip to main content
Mallory

Microsoft Teams Vishing Used to Gain Remote Access and Deploy Malware

voice-social-engineeringinitial-access-methodremote-access-implantcommand-and-control-methodcredential-access-method
Updated March 21, 2026 at 09:02 AM3 sources
Share:
Microsoft Teams Vishing Used to Gain Remote Access and Deploy Malware

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Attackers used Microsoft Teams to impersonate IT or helpdesk staff and socially engineer employees into granting access or executing malicious actions, turning collaboration tooling and trusted support workflows into the initial access vector. One report describes a compromise at an Italy-based consumer services company where a Teams meeting invite and screen sharing session led the victim to run a staged PowerShell chain that deployed PhantomBackdoor, a multi-stage WebSocket-based backdoor associated with earlier spear-phishing activity. The observed sequence included post-call PowerShell execution, device reconnaissance, and establishment of WebSocket command-and-control.

A second report describes a similar vishing intrusion in which a threat actor posing as support staff called employees through Teams and, after multiple attempts, convinced one user to grant remote access through Quick Assist. The attacker then directed the victim to a spoofed credential-harvesting site, used a malicious MSI and sideloaded DLL to launch follow-on payloads, and established outbound C2. While the malware families and exact post-compromise chains differ, both accounts document the same operational pattern: Teams-based social engineering, abuse of legitimate remote assistance or user-guided execution, credential theft or payload staging, and transition to hands-on intrusion activity inside a corporate environment.

Timeline

  1. Mar 18, 2026

    Cato CTRL publishes PhantomBackdoor Teams-vishing findings

    Cato CTRL published research on a Teams-based vishing intrusion delivering PhantomBackdoor to an Italy-based organization. The report noted behavioral overlap with earlier SentinelOne reporting while emphasizing a different delivery method and broader concern around collaboration platforms as attack surfaces.

  2. Mar 18, 2026

    Microsoft publicly discloses November 2025 Teams vishing case

    Microsoft publicly described the November 2025 intrusion as an example of identity-first attacks abusing trust, collaboration platforms, and legitimate Windows tools rather than software vulnerabilities. The disclosure highlighted the use of Teams and Quick Assist in the attack chain.

  3. Mar 18, 2026

    Microsoft DART contains and remediates the Quick Assist intrusion

    Microsoft Detection and Response Team determined the compromise originated from the Teams vishing interaction, contained the incident, and found it to be short-lived and limited in scope. After remediation, Microsoft reported that no persistence mechanisms remained.

  4. Mar 18, 2026

    Italy-based company hit with Teams helpdesk vishing delivering PhantomBackdoor

    An Italy-based consumer services company was compromised in a vishing-driven intrusion in which attackers used a Microsoft Teams helpdesk impersonation and screen-sharing interaction to get the victim to execute staged PowerShell payloads. The infection chain used fileless in-memory PowerShell, contacted maxsolutions243[.]com, and established WebSocket command-and-control for PhantomBackdoor.

  5. Nov 1, 2025

    Victim grants Quick Assist access, leading to corporate compromise

    During the November 2025 campaign, a third employee was persuaded to grant remote access through Quick Assist and was then directed to a spoofed credential-harvesting site. The attacker used a disguised MSI package to sideload a malicious DLL, establish command-and-control, and deploy additional post-compromise capabilities.

  6. Nov 1, 2025

    Threat actor launches Teams vishing attempts against employees

    In November 2025, a threat actor impersonating IT support over Microsoft Teams targeted employees in a corporate environment. Microsoft reported that two initial attempts against employees failed before the attacker reached a third user.

  7. May 8, 2023

    Italy-based engineering firm targeted with Teams vishing delivering PhantomBackdoor

    Cato CTRL reported a social-engineering intrusion against an Italy-based engineering firm in which attackers used voice phishing and Microsoft Teams to deliver the PhantomBackdoor malware. The case highlighted Teams as a delivery vector in a vishing-led compromise.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Microsoft Teams Social Engineering Abuses Quick Assist to Deploy A0Backdoor

Microsoft Teams Social Engineering Abuses Quick Assist to Deploy A0Backdoor

A social-engineering campaign targeting employees at **financial and healthcare** organizations is abusing **Microsoft Teams** chats/calls to trick users into granting remote access via *Windows Quick Assist*, enabling deployment of a newly identified malware family dubbed **A0Backdoor**. The activity begins with **email bombing** (flooding inboxes with spam) followed by an attacker impersonating internal IT over Teams, offering help and then persuading the victim to start a Quick Assist session; the tradecraft overlaps with tactics previously attributed to **Blitz Brigantine / Storm-1811**, which Microsoft has linked to **Black Basta**-associated operations. Post-access, the actor deploys **digitally signed MSI installers** masquerading as Teams-related components and *CrossDeviceService* (associated with Windows *Phone Link*), sometimes delivered via **tokenized links** from Microsoft personal cloud storage to appear trustworthy and hinder collection. BlueVoyant reported the installers drop files into user `AppData` paths that mimic legitimate Microsoft locations and use **DLL sideloading** (e.g., a malicious `hostfxr.dll`) to execute an in-memory loader that decrypts shellcode, performs sandbox checks, and ultimately extracts and runs **A0Backdoor** (using **AES**-encrypted payloads and a **SHA-256**-derived key), with anti-analysis behavior including excessive thread creation intended to disrupt debugging.

3 days ago
A0Backdoor Campaign Abuses Microsoft Teams and Quick Assist for Initial Access

A0Backdoor Campaign Abuses Microsoft Teams and Quick Assist for Initial Access

**BlueVoyant researchers identified a social-engineering campaign** in which operators linked to **Blitz Brigantine / Storm-1811 / STAC5777**, a cluster associated with the **Black Basta** ecosystem, impersonate IT support over **Microsoft Teams** after overwhelming targets with spam email. Victims are persuaded to launch **Quick Assist**, giving the attackers remote access that is then used to deploy **A0Backdoor** through digitally signed MSI packages masquerading as legitimate Microsoft software such as *Microsoft Teams* and *CrossDeviceService*. The activity has targeted organizations in sectors including **finance** and **healthcare**, and the use of multiple code-signing certificates suggests the operators prepared the toolchain well before the observed intrusions. Once installed, **A0Backdoor** fingerprints the host and communicates with operators using **DNS tunneling** over public resolvers, helping the malware blend into normal traffic while maintaining persistence and command-and-control. The reporting is substantive threat intelligence rather than promotional or advisory content, and the only other mention of the same event is a newsletter item that cites the A0Backdoor research as one entry among many malware stories. Other references in the set cover unrelated vulnerabilities, policy developments, AI security issues, phishing, ransomware trends, and separate malware campaigns, and do not describe this specific Teams-and-Quick-Assist intrusion chain.

1 months ago
Phishing Campaigns Delivering Malware via Disguised, Signed Installers and Malicious Attachments

Phishing Campaigns Delivering Malware via Disguised, Signed Installers and Malicious Attachments

Security researchers reported active phishing activity targeting enterprise users by impersonating routine workplace workflows (e.g., meeting invites, invoices, and document notifications) to trick recipients into running malware. One campaign used executables masquerading as *Microsoft Teams*, *Zoom*, and *Adobe Acrobat Reader* installers (e.g., `msteams.exe`, `zoomworkspace.clientsetup.exe`, `adobereader.exe`, `invite.exe`) that appeared trustworthy because they were **digitally signed** with an Extended Validation (EV) certificate issued to **TrustConnect Software PTY LTD**. Microsoft Defender telemetry attributed the activity to an unknown threat actor and assessed the approach as a deliberate, multi-wave effort designed to bypass user suspicion and basic security controls. After execution, the signed malware deployed **remote monitoring and management (RMM)** tooling—reported examples include **ScreenConnect**, **Tactical RMM**, and **Mesh Agent**—to establish persistent remote access and enable follow-on actions across affected environments. Separately, reporting also highlighted phishing lures distributing **malicious ISO attachments** embedded in job application/resumé-themed emails, reinforcing that attackers continue to rely on socially engineered business processes (recruiting and HR workflows in particular) to deliver initial payloads and gain a foothold.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.