Threat IntelHIGH

Threat Intel - Attackers Exploit Teams and Quick Assist

🎯

Basically, attackers are tricking people into giving them access to their computers using Microsoft tools.

Quick Summary

A new backdoor, A0Backdoor, is exploiting Microsoft Teams and Quick Assist. Targeting finance and healthcare sectors, it poses significant risks to organizations. Security teams must act swiftly to mitigate this threat.

The Threat

A newly identified backdoor, known as A0Backdoor, has surfaced in a well-orchestrated social-engineering campaign. This campaign exploits Microsoft Teams and the Windows Quick Assist tool to gain unauthorized access to victims' machines. The threat actors behind this attack are tracked under various aliases, including Blitz Brigantine, Storm-1811, and STAC5777, with connections to the notorious Black Basta ransomware network. Active since at least August 2025, this campaign has targeted professionals in the finance and healthcare sectors, showcasing a refined attack strategy.

The attack begins with the threat group inundating the target's inbox with thousands of spam emails, creating confusion and urgency. They then reach out through Microsoft Teams, masquerading as IT support staff, and offer assistance with the email issues. Victims, believing they are communicating with legitimate support, grant remote access via Quick Assist, unwittingly allowing attackers to establish a foothold on their systems.

Who's Behind It

The threat group behind A0Backdoor has demonstrated a high level of sophistication in their methods. Analysts from BlueVoyant have identified multiple incidents linked to this campaign, revealing that the software delivered to victims is disguised as legitimate Microsoft applications. This includes not only Microsoft Teams but also a utility called CrossDeviceService, packaged as digitally signed MSI installer files. Such tactics lend the malware an appearance of authenticity, making it harder for victims to discern the threat.

The group has been building its custom toolset quietly for months, as evidenced by the use of at least three code-signing certificates dating back to July 2025. This careful planning and execution suggest a well-resourced and organized threat actor, capable of evading detection while executing their malicious activities.

Tactics & Techniques

The infection mechanism employed by A0Backdoor is particularly noteworthy. When the attackers drop the malicious MSI package onto a victim's machine, it installs a seemingly legitimate Microsoft application alongside a compromised file named hostfxr.dll. This method, known as DLL sideloading, allows the malware to run silently under the guise of a trusted process. The malicious hostfxr.dll decrypts hidden data and transfers execution to a shellcode payload, complicating analysis and detection efforts.

Moreover, the malware employs advanced techniques to avoid detection. It issues excessive CreateThread calls to crash debuggers and checks for virtual environments to evade analysis. The final payload communicates with its operators through DNS tunneling, utilizing high-entropy subdomains that blend into normal network traffic. This stealthy approach makes it challenging for security teams to identify and mitigate the threat.

Defensive Measures

Organizations must take proactive steps to defend against the A0Backdoor threat. First and foremost, restricting the use of Quick Assist across enterprise environments is crucial. Implementing policies to block unsolicited remote access sessions can significantly reduce risk. Additionally, training employees to verify any IT support contact made through Microsoft Teams before granting access or sharing credentials is essential.

Security teams should remain vigilant by monitoring for MSI packages appearing in user AppData directories and flagging outbound DNS MX queries directed at public resolvers. Furthermore, restricting Microsoft Teams external access from unrecognized tenants can help mitigate the initial contact channels exploited by this threat group. By adopting these measures, organizations can bolster their defenses against the evolving tactics employed by A0Backdoor operators.

🔒 Pro insight: The A0Backdoor campaign exemplifies advanced social engineering tactics, leveraging trusted tools to bypass traditional security measures.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intelligence - Key Cyberattack Insights Revealed

A major cyberattack on Stryker disrupts global operations, with Handala Hack claiming responsibility. Other breaches include Telus and Signal, highlighting ongoing threats. Stay alert and informed.

Check Point Research·
HIGHThreat Intel

Threat Intel - Weekly Recap on Chrome 0-Days and Botnets

This week saw critical vulnerabilities in Chrome and AWS breaches. Major botnets like SocksEscort and KadNap are exploiting network devices, posing serious risks. Stay informed and secure your systems!

The Hacker News·
HIGHThreat Intel

Signal Account Takeover - Targeting German Officials Explained

A wave of cyberattacks has targeted German officials, including a former BND VP. Hackers impersonate Signal support to hijack accounts, raising serious security concerns. Authorities urge users to stay vigilant and report suspicious activity.

Security Affairs·
HIGHThreat Intel

Handala Threat Group - Iranian Cyber Operations Unveiled

The Handala threat group is targeting Israel and Western nations with destructive cyber operations. Their activities involve espionage and disruption, raising significant cybersecurity concerns. Organizations must enhance defenses against these emerging threats.

Intel 471 Blog·
MEDIUMThreat Intel

Proxy URL Scans - New Patterns Detected in Logs

New scanning patterns targeting proxy servers have been detected. Cybercriminals are using specific URL prefixes to exploit vulnerabilities. This highlights the need for enhanced security measures.

SANS ISC·
HIGHThreat Intel

Threat Intel - Russia-linked Espionage Campaign Targets Ukraine

A new cyber-espionage campaign from a Russia-linked hacker group is targeting Ukraine. Using fake documents about Starlink and a charity, they aim to install spyware. This poses serious risks to sensitive organizations across the country.

The Record·