Real Value or AI Trash?

blog-bg-threat

Emerging Threat: Microsoft Teams Vishing Campaign Continues 

Subscribe to get the latest updates and resources

A rapidly escalating threat is reshaping the way organizations think about security; one that doesn’t rely on breaking systems, but on manipulating people. CyOps threat operations unit continues to see a rise in this activity, specifically known as “Teams vishing.” This social engineering technique exploits user trust to infiltrate corporate environments with alarming speed and efficiency.  

Download Cynet’s 2H 2025 ECHO report to learn why tactics like vishing, living off the land (LotL), and supply chain attacks are on the rise in 2026.

Rather than targeting technical vulnerabilities, attackers pose as trusted internal figures, most often IT support staff, to persuade employees to grant remote access to their devices. What follows can unfold in minutes: once inside, attackers establish persistent control and begin executing malicious activity, often before traditional defenses have a chance to respond. 

The combination of simplicity, low cost, and an ability to bypass conventional security measures has made Teams vishing an increasingly attractive tactic for threat actors and a significant risk for organizations. Read more to understand the evolving stages and additional indicators of compromise (IOCs) to better strengthen and defend your environment.  

Attack stages 

Email Bombing 

In some cases, the attacker’s initial attack stage is performing Email Bombing on targeted users, subscribing them to a large number of legitimate sites and/or services causing the flooding of the user’s mailbox with registration and password reset emails. 

This allows the attacker the “legitimacy” of directly contacting the user, lowering their guard. 

Teams Vishing 

The attacker contacts the targeted user via Teams from an external domain, using a display name that impersonates the IT/Helpdesk department (ex. “IT Support”, “Helpdesk”), trying to convince the user to allow them remote access to their machine to “fix” the issue. 

It has been observed that attackers favor using a “*.onmicrosoft.com” subdomain, which is a legitimate Microsoft domain that is given to users when they purchase a subscription to Office 365 for Business.  

Attacker call display names 

  • help desk 
  • Help Desk 
  • IT Support🛡️ | Corporate IT Service 🛠️ (Internal) 
  • IT Assistance 
  • IT Support 

Attacker’s Domains 

  • corporate@ITElectronicsHelpDesk[.]onmicrosoft[.]com 
  • Services@HelpDeskEngineeringIT[.]onmicrosoft[.]com 
  • ithelpdesk@DailyExternalSystem[.]onmicrosoft[.]com 
  • Support@sunfornia[.]onmicrosoft[.]com 
  • Corporate@HelpDeskWindowsFamily[.]onmicrosoft[.]com 
  • Service@HelpDeskToolPC[.]onmicrosoft[.]com 
  • IT@HelpDeskEngineeringIT[.]onmicrosoft[.]com 
  • Service@MacBookHelpDesk[.]onmicrosoft[.]com 

RMM 

The attacker then instructs the user to allow them remote access to the machine. The CyOps Team has observed the usage of Quick assist and Anydesk in these campaigns. Quick Assist seems especially favorable by attackers, as it is built-in on Windows and avoids instructing the user through the download of additional applications on the machine and risking raising suspicion. 

Execution of malicious code 

After gaining access, the attacker proceeds with the dropping and execution of malicious files, usually resulting in the installation of a backdoor that will allow the attacker full, persistent access to the compromised machine. 

Among the installation methods observed, DLL sideloading and DLL proxying proved prevalent. 

Data reveals that the duration of such attacks can be as short as 3 minutes from the start of the conversation to the compromise of the host. Additionally, it shows that attackers can target as few as 2 users before landing a successful attack. 

This highlights the ease with which attackers can manipulate victims, ultimately achieving initial access to an organization’s network without a single password cracked, or application vulnerability exploited. This Low cost-high reward approach is steadily gaining more traction by threat actors in recent months. 

IOCs 

Filename SHA256 Description 
Wer.dll  0015d41c98a49b31e727a350f5de213fbda3e3e56f6dd3791709e74233559c17  Backdoor 
vcruntime140_1.dll  0b01978b494f7064bc8417a02f86fd1ca183022323198ff1d9280ff4335d34e7  Backdoor 
werfault.exe 9B500FB3B236DEEA6B11A20CC3F2CBD737E842E4C7AEEAF3CF2F6E6BE6AF7411 Legitimate Executable used for DLL sideloading 
ADNotificationManager.exe c10e144c25c1bac0692ed0b31dd626ab9195c5285b82430371a4ecdbd6d7f3fd Legitimate Executable used for DLL sideloading 
Indicator Type Description 
193.203.49[.]62 IP C2 
5.34.178[.]189 IP C2 

Why this matters to MSPs 

The simplicity of the attack chain is another example of how threat actors abusing “trust”. Teams vishing is particularly dangerous for the MSP model because it weaponizes the helpful, “always-on” relationship you strive to build with your clients. If a client’s employee is conditioned to follow instructions from “IT,” they become the weakest link in a chain you are paid to secure. A single successful session can lead to ransomware deployment or lateral movement across a client’s network, resulting in financial loss, legal liability, and reputational damage.  

From our previous blog tracking this campaign, the best practices remain the same:  

  • Review Microsoft Teams external access settings: many organizations have external contact enabled by default, and for many the right posture is to require approval before external parties can initiate contact. 
  • Expand security awareness training: ensure training goes beyond email phishing to include social engineering through collaboration platforms, including realistic simulations involving voice and video calls. 
  • Monitor end-user deployment of remote access tools: even legitimate tools like QuickAssist should trigger alerts and require validation before proceeding. 

Related Posts

Geopolitics, Cyber-Terrorism, and the Stryker Attack: What Happened and What Comes Next 
Five Months, 1,600 Credentials, and Real-World Freight Fraud: Inside the Diesel Vortex Threat Actor Group
Qilin, Green Blood, 0APT: Ransomware Groups to Watch (March 2026) 
Typosquatting, Steganography, and Worms: The February NPM Attack Wave
February 2026 Cyber Threat Intelligence Roundup: What Security Teams Need to Know This Month

Keep Reading

Stryker BReach Image
VOrtex
Double Extortion Blog Feb 2026

Search results for: