Attackers Abuse Microsoft Teams and Quick Assist to Drop Stealthy A0Backdoor

Related

Female Cybersecurity Leaders to Watch in North Carolina

North Carolina’s cybersecurity leadership strength cuts across state government,...

Female Cybersecurity Leaders to Watch in Minnesota

Minnesota’s cybersecurity leadership strength shows up across agriculture, banking,...

Google Deploys Gemini AI to Monitor Dark Web for Cyber Threats

What happened Google has deployed Gemini AI agents within its...

Infinite Campus Warns of Breach After ShinyHunters Claims Data Theft

What happened Infinite Campus, a major U.S. K-12 student information...

Dutch Ministry of Finance Discloses Breach Affecting Employees

What happened The Dutch Ministry of Finance confirmed that some...

Share

What happened

Attackers used a social-engineering campaign involving Microsoft Teams and the built-in Windows remote assistance tool Quick Assist to deliver a stealthy malware called A0Backdoor to victims in the finance and healthcare sectors. The group, tracked as Blitz Brigantine, Storm-1811, and STAC5777, first flooded targets with spam emails, then contacted them through Teams while posing as IT support staff offering help. Once victims granted remote access through Quick Assist, the attackers installed digitally signed MSI packages disguised as legitimate Microsoft software, which used DLL sideloading to load the A0Backdoor malware. Researchers from BlueVoyant found the malware communicates through DNS tunneling using public resolvers and lapsed domains, making detection more difficult while allowing attackers to maintain long-term access. 

Who is affected

Professionals in the finance and healthcare sectors are affected, particularly organizations where employees can be contacted through Microsoft Teams and persuaded to grant remote access via Quick Assist. 

Why CISOs should care

The campaign shows how attackers can combine social engineering with trusted collaboration and remote support tools to gain access, install stealthy malware, and evade common detection methods through DNS-based command-and-control traffic. 

3 practical actions

  1. Restrict Quick Assist usage. Limit or disable unsolicited remote access sessions across enterprise environments. 
  2. Control external Microsoft Teams access. Reduce contact from unrecognized tenants that may be used for social-engineering attacks. 
  3. Monitor for MSI and DNS tunneling indicators. Investigate suspicious MSI installers in user directories and abnormal DNS MX queries through public resolvers. 

For more reporting on threats involving credential-stealing malware, explore our latest coverage under the Malware tag.