Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Threat Actors Exploit Vercel AI Tools for Leverage Vercel’s
May 12, 2026
Hackers Hijack Microsoft Teams to Deliver ModeloRAT
May 12, 2026
North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform
May 12, 2026
Home/Threats/Hackers Hijack Microsoft Teams to Deliver ModeloRAT
Threats

Hackers Hijack Microsoft Teams to Deliver ModeloRAT

Threat actors are now leveraging fake or hijacked Microsoft Teams accounts to directly contact victims, posing as internal IT helpdesk staff. Their primary objective is to persuade targets into...

Emy Elsamnoudy
Emy Elsamnoudy
May 12, 2026 3 Min Read
1 0

Threat actors are now leveraging fake or hijacked Microsoft Teams accounts to directly contact victims, posing as internal IT helpdesk staff. Their primary objective is to persuade targets into executing an obfuscated PowerShell command. Once run, this command initiates a multi-stage infection process: it drops a ZIP archive into the system’s AppData folder, unpacks it locally, and then launches the Modelo

How ModeloRAT Evades Detection

The archive that gets dropped contains a portable Python environment alongside malicious Python components. From there, the execution splits into two distinct parts: one focused on reconnaissance and the other on communicating with a remote command-and-control server.

This two-part structure allows attackers to quietly gather system information while maintaining a persistent and stealthy connection back to their infrastructure, all without raising obvious red flags during normal endpoint monitoring.

One of the most alarming aspects of this campaign is how effectively the malware avoids being caught. During the investigation, the samples collected had zero detections on VirusTotal, meaning the files were not flagged by any of the antivirus engines checked at the time of analysis. The malware also bypassed several major endpoint detection and response tools, which are typically a critical last line of defense in enterprise environments.

Persistence is another area where this version stands apart from earlier variants. Beyond writing itself to a standard Windows startup registry key, the malware also creates a scheduled task using a randomly generated name.

This makes it considerably harder for defenders to spot the malicious task among legitimate ones, and ensures the malware restarts automatically even if the registry entry gets removed. Together, these techniques show a clear and deliberate effort to stay hidden and keep running as long as possible on compromised systems.

Protecting Your Organization

Organizations can take several practical steps to significantly reduce the risk posed by this type of attack. One of the most straightforward moves is to review Microsoft Teams external access settings and restrict or disable messages from unknown or unverified external tenants.

Since the attackers rely on reaching victims directly through Teams, limiting who can contact employees is a strong and immediate first line of defense that requires no additional tools.

Security teams should also set up alerts for Dropbox downloads on corporate devices, particularly where there is no clear business need for that kind of external file access. Monitoring for ZIP file extraction inside AppData directories is another useful and practical detection approach.

Since the malware relies on a portable Python environment to execute, tracking unusual instances of pythonw.exe running from user-writable paths like AppData can help surface suspicious activity early. Regularly reviewing new scheduled task registrations and registry run key changes can help catch persistence attempts before they quietly take hold.

Indicators of Compromise (IoCs):-

Type Indicator Description
IP Address 45.61.136.94 Observed ModeloRAT C2 server
IP Address 64.95.10.14 Observed ModeloRAT C2 server
IP Address 64.95.12.238 Observed ModeloRAT C2 server
IP Address 64.95.13.76 Observed ModeloRAT C2 server
IP Address 162.33.179.149 Observed ModeloRAT C2 server
File Path %APPDATA%WPy64-31401 Malware execution directory containing portable Python environment
Process pythonw.exe Portable Python used to execute malicious components from AppData

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform

Next Post

Threat Actors Exploit Vercel AI Tools for Leverage Vercel’s

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Microsoft Warns: MistralAI PyPI Package Injects Compromised Malicious
May 12, 2026
Claude Chrome Extension Flaw Steals Gmail & Drive Data
May 12, 2026
Critical PHP SOAP Flaws Enable Remote Code Execution Attacks
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us