Malware Crew Impersonates Helpdesk via Microsoft Teams

A new cybercrime group is stealing data by impersonating helpdesk staff on Microsoft Teams. This attack uses custom malware to harvest credentials. Organizations must be vigilant against these sophisticated social engineering tactics.

Malware & RansomwareHIGHUpdated: Published:
Featured image for Malware Crew Impersonates Helpdesk via Microsoft Teams

Original Reporting

REThe Register Security

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, hackers pretend to be helpdesk staff on Microsoft Teams to steal your passwords.

What Happened

A new cybercrime group, tracked as UNC6692, has emerged, employing social engineering tactics to exploit Microsoft Teams. They impersonate helpdesk personnel to trick users into revealing sensitive credentials. This attack began with a large email campaign that overwhelmed target organizations, leading to confusion and a higher likelihood of user interaction with the attackers.

How It Works

The attackers send out a barrage of emails, and once users are overwhelmed, they pose as helpdesk staff via Microsoft Teams. They offer assistance with the email volume, prompting users to click on a link that leads to a fake Mailbox Repair Utility. This page requests users to authenticate with their email and password, using a psychological trick that makes them believe their credentials are being validated.

Who's Being Targeted

Organizations that utilize Microsoft Teams for communication are prime targets. The attackers take advantage of the trust users place in helpdesk communications, making this a widespread threat across various sectors.

Signs of Infection

Victims may notice unusual activity on their accounts, such as unauthorized access or changes to settings. Additionally, if users have installed any unexpected browser extensions, especially those masquerading as legitimate tools, they should investigate further.

How to Protect Yourself

Detection

  • 1.Be cautious with unsolicited helpdesk communications. Always verify the identity of anyone claiming to be from IT support.
  • 2.Avoid clicking on suspicious links. If you receive a link from a helpdesk, confirm it through official channels before clicking.

Removal

  • 3.Use multi-factor authentication (MFA). This adds an extra layer of security, making it harder for attackers to gain access even if they have your credentials.
  • 4.Educate your team. Regular training on recognizing phishing attempts and social engineering tactics can greatly reduce the risk of falling victim to such attacks.

Technical Details

The malware used in this attack includes several components:

  • SnowBelt: A malicious Chromium browser extension that maintains persistence and allows the attacker to control the infected system.
  • SnowGlaze: A Python-based tunneler that manages communication between the victim's network and the attacker's infrastructure.
  • SnowBasin: A bindshell that provides interactive control over the infected system, allowing for remote command execution.

Conclusion

The rise of UNC6692 highlights the evolving tactics of cybercriminals, especially in leveraging trusted platforms like Microsoft Teams. Organizations must remain vigilant and proactive in their cybersecurity measures to combat these sophisticated threats.

🔒 Pro Insight

🔒 Pro insight: The use of social engineering combined with legitimate platforms like Teams underscores the need for enhanced user training and multi-factor authentication.

REThe Register Security
Read Original

Related Pings