Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Teams increasingly abused in helpdesk impersonation attacks
    Cybersecurity

    Teams increasingly abused in helpdesk impersonation attacks

    adminBy adminApril 20, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Microsoft: Teams increasingly abused in helpdesk impersonation attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Microsoft: Teams increasingly abused in helpdesk impersonation attacks

    Microsoft is warning of threat actors increasingly abusing external Microsoft Teams collaboration and relying on legitimate tools for access and lateral movement on enterprise networks.

    The hackers impersonate IT or helpdesk staff to contact employees through cross-tenant chats and trick them into providing remote access for data theft purposes.

    Microsoft has observed multiple intrusions with a similar attack chain that used commercial remote management software, such as Quick Assist, and the Rclone utility to transfer files to an external cloud storage service.

    Wiz

    The tech giant notes that follow-on malicious activity is hard to discern from normal operations because of the heavy use of legitimate applications and native administrative protocolos.

    “Threat actors are increasingly abusing external Microsoft Teams collaboration to impersonate IT or helpdesk personnel and convince users to grant remote assistance access,” Microsoft says.

    “From this initial foothold, attackers can leverage trusted tools and native administrative protocols to move laterally across the enterprise and stage sensitive data for exfiltration—often blending into routine IT support activity throughout the intrusion lifecycle,” the company added.

    Multi-stage attack

    In a recent report, Microsoft describes a nine-stage attack chain that begins with the threat actor contacting the target via an external Teams chat, posing as a member of the company’s IT staff  and claiming they need to address an account issue or perform a security update.

    The goal is to convince the target to start a remote support session, usually via Quick Assist, which gives the attacker direct control of the employee’s machine.

    Malicious message sent to targets
    Malicious message sent to targets
    Source: Microsoft

    From there, the attacker performs quick reconnaissance using Command Prompt and PowerShell, checking privileges, domain membership, and network reachability to evaluate the potential for lateral movement.

    Then they drop a small payload bundle in user-writable locations such as ProgramData and execute the malicious code through a trusted, signed application (e.g., Autodesk, Adobe Acrobat/Reader, Windows Error Reporting, data loss prevention software) via DLL side-loading.

    The HTTPS-based communication to the command-and-control (C2) established this way blends into normal outbound traffic, making it more difficult to detect.

    With the infection established and persistence secured via Windows Registry modifications, the attacker proceeds to abuse Windows Remote Management (WinRM) to move laterally across the network, targeting domain-joined systems and high-value assets such as domain controllers.

    They then deploy additional remote management software tools onto reachable systems and use Rclone or similar tools to collect and exfiltrate sensitive data to external cloud storage points.

    Attack stages
    Attack stages
    Source: Microsoft

    Microsoft notes that this exfiltration step is rather targeted, employing filters to focus only on valuable information, reduce transfer volume, and improve operational stealth.

    Microsoft reminds users to treat external Teams contacts as untrusted by default, and recommends that administrators restrict or closely monitor remote assistance tools, and limit WinRM usage to controlled systems.

    Apart from this, the company draws attention to the Teams security warnings that explicitly flag communications from persons outside the organization and potential phishing attempts.


    tines

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    abused attacks helpdesk impersonation Increasingly teams
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleOnePlus confirms regional roadmap rethink amid key employee departures
    Next Article Pixel 11 still starts at 128GB, and it points to something bigger
    admin
    • Website

    Related Posts

    Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More

    April 20, 2026

    Stellantis teams with Microsoft to strengthen digital capabilities

    April 20, 2026

    British Scattered Spider Hacker Pleads Guilty in the US

    April 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Motorola strives for ‘iconic’ again in the Razr 2026 series, teases foldables before launch

    April 20, 2026

    Google tests video ads in local search results

    April 20, 2026

    Accurate Background review | TechRadar

    April 20, 2026

    Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More

    April 20, 2026
    Categories
    • Blogging (66)
    • Cybersecurity (1,411)
    • Privacy & Online Earning (173)
    • SEO & Digital Marketing (856)
    • Tech Tools & Mobile / Apps (1,701)
    • WiFi / Internet & Networking (234)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Motorola strives for ‘iconic’ again in the Razr 2026 series, teases foldables before launch

    April 20, 2026

    Google tests video ads in local search results

    April 20, 2026

    Accurate Background review | TechRadar

    April 20, 2026
    Most Popular
    • Motorola strives for ‘iconic’ again in the Razr 2026 series, teases foldables before launch
    • Google tests video ads in local search results
    • Accurate Background review | TechRadar
    • Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More
    • Complete Guide to Tracking, Measuring & Optimizing
    • Notion Mail’s best feature has nothing to do with email
    • Stellantis teams with Microsoft to strengthen digital capabilities
    • What Is Agentic Search? (And Why SEOs Need to Pay Attention)
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.