Security Advisory:
A new wave of social engineering attacks is exploiting Microsoft Teams, one of the most trusted enterprise collaboration platforms as a malware delivery channel.
Threat actors are impersonating IT support staff to trick employees into installing remote access tools and running malicious PowerShell scripts, enabling full compromise of victim environments.
This campaign represents an evolution beyond traditional phishing, weaponizing corporate communication channels that employees inherently trust. Once access is established, attackers deploy multifunctional malware loaders such as DarkGate and Matanbuchus, with capabilities for credential theft, persistence, lateral movement and ransomware deployment.
Technical Summary
Security researchers have observed financially motivated threat groups abusing Microsoft Teams chats and calls to impersonate IT administrators. Attackers create malicious or compromised Teams accounts often using convincing display names like “IT SUPPORT ” or “Help Desk Specialist” as looking like legitimate and verified account to initiate direct conversations with employees. The social engineering process typically follows this chain

Attack Process Source: permiso.io
It included the malware features
The campaigns have been linked to threat actor groups such as Water Gamayun (aka EncryptHub), known for blending social engineering, custom malware and ransomware operations.
| Element | Detail |
| Initial Access | Direct messages/calls via Microsoft Teams impersonating IT staff |
| Social Engineering | Fake IT accounts with display names like “IT SUPPORT ✅” and onmicrosoft.com domains |
| Malicious Tools | QuickAssist, AnyDesk, PowerShell-based loaders (DarkGate, Matanbuchus) |
| Persistence | Scheduled Tasks (Google LLC Updater), Registry autoruns |
| Payload Features | Credential theft, system profiling, encrypted C2, remote execution |
| Target | Enterprise employees, IT professionals, developers |
| Objective | Credential theft, long-term access, ransomware deployment |
IOCs
Organizations are urged to block the following indicators immediately:
| Indicator | Type |
| https://audiorealteak[.]com/payload/build.ps1 | URL |
| https://cjhsbam[.]com/payload/runner.ps1 | URL |
| 104.21.40[.]219 | IPv4 |
| 193.5.65[.]199 | IPv4 |
| Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) AppleWebKit/534.6 (KHTML, like Gecko) Chrome/7.0.500.0 Safari/534.6 | UA |
| &9*zS7LY%ZN1thfI | Initialization Vector |
| 123456789012345678901234r0hollah | Encryption Key |
| 62088a7b-ae9f-2333-77a-6e9c921cb48e | Mutex |
| Help Desk Specialist | User Display Name |
| IT SUPPORT | User Display Name |
| Marco DaSilva IT Support | User Display Name |
| IT SUPPORT | User Display Name |
| Help Desk | User Display Name |
| @cybersecurityadm.onmicrosoft.com | User Principal Name |
| @updateteamis.onmicrosoft.com | User Principal Name |
| @supportbotit.onmicrosoft.com | User Principal Name |
| @replysupport.onmicrosoft.com | User Principal Name |
| @administratoritdep.onmicrosoft.com | User Principal Name |
| @luxadmln.onmicrosoft.com | User Principal Name |
| @firewalloverview.onmicrosoft.com | User Principal Name |
Remediation:
2. Enhance Endpoint & Network Defenses
3. Employee Awareness & MFA Security
Conclusion:
By shifting malware delivery into Microsoft Teams, attackers are exploiting a platform that enterprises inherently trust. The blending of social engineering with technical abuse of PowerShell and remote access tools makes this campaign particularly dangerous, enabling attackers to infiltrate organizations without relying on traditional email phishing.
Organizations must treat collaboration platforms as high-value attack surfaces not just communication tools. Strengthening monitoring, restricting external interactions and training employees to validate IT requests are critical to defending against this evolving threat.
References:
Recent Comments