Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (microsoft.com) Cross-Tenant Microsoft Teams Helpdesk Impersonation Campaign Enabling Multi-Stage Enterprise Compromise

(microsoft.com) Cross-Tenant Microsoft Teams Helpdesk Impersonation Campaign Enabling Multi-Stage Enterprise Compromise

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (microsoft.com) Cross-Tenant Microsoft Teams Helpdesk Impersonation Campaign Enabling Multi-Stage Enterprise Compromise

    New multi-stage intrusion campaign abuses Microsoft Teams cross-tenant messaging to impersonate IT helpdesk (T1566.003), tricking users into Quick Assist remote access. Attackers deploy DLL sideloading via vendor-signed binaries (AcroServicesUpdater2_x64.exe, ADNotificationManager.exe, DlpUserAgent.exe) and Havoc C2 framework with registry-based encrypted configs. Lateral movement via WinRM (TCP 5985) targets domain controllers; exfiltration uses Rclone to cloud storage.

    In brief - Threat actors exploit Teams external collaboration to impersonate helpdesk, gain remote access via Quick Assist, and execute a stealthy multi-stage compromise using legitimate tools and protocols to evade detection.

    Technically - Initial access via cross-tenant Teams phishing (T1566.003) leads to Quick Assist abuse. DLL sideloading (msi.dll, vcruntime140_1.dll, mpclient.dll) via signed binaries in ProgramData. Havoc C2 with encrypted registry configs (user-context). Lateral movement via WinRM (TCP 5985) using harvested creds. Persistence via RMM tools (msiexec.exe). Exfiltration via Rclone to external cloud. Defender XDR KQL queries available for hunting across MessageEvents, DeviceProcessEvents, and other tables.

    Source: https://www.microsoft.com/en-us/security/blog/2026/04/18/crosstenant-helpdesk-impersonation-data-exfiltration-human-operated-intrusion-playbook/

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups