Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Home/Threats/New Helpdesk Impersonation Abuses Microsoft Attackers Teams
Threats

New Helpdesk Impersonation Abuses Microsoft Attackers Teams

A new and deceptive The attack starts simply. A threat actor, operating from a separate Microsoft tenant, sends an unsolicited Teams message to a target employee while posing as internal IT support...

Jennifer sherman
Jennifer sherman
April 20, 2026 3 Min Read
14 0

A new and deceptive

The attack starts simply. A threat actor, operating from a separate Microsoft tenant, sends an unsolicited Teams message to a target employee while posing as internal IT support staff.

Since the contact arrives through a familiar collaboration platform rather than a suspicious email, many employees instinctively lower their guard.

The attacker then convinces the victim to ignore built-in external contact warnings and approve a remote assistance session through Microsoft Quick Assist.

URL click warning (Source - Micrsoft)
URL click warning (Source – Micrsoft)

Once this step is completed, the attacker has full interactive control of the victim’s device, usually in under a minute.

Microsoft Defender Security Research analysts identified this intrusion playbook, noting that the attack relies entirely on human-operated decisions rather than traditional software exploits.

Researchers highlighted that this attack chain blends into routine IT activity, making it very difficult to detect without proper event correlation across identity, endpoint, and collaboration telemetry.

Spam or phishing alert (Source - Micrsoft)
Spam or phishing alert (Source – Micrsoft)

Once inside, the attacker wastes no time. Within 30 to 120 seconds of gaining remote access via Quick Assist, they run rapid reconnaissance commands to check user privileges, gather host details, and assess network connectivity.

If the system has sufficient access, the attacker deploys a staged payload into directories like ProgramData and uses DLL side-loading to run malicious code through trusted, digitally signed applications.

Tools such as AcroServicesUpdater2_x64.exe, ADNotificationManager.exe, and DlpUserAgent.exe were observed loading attacker-supplied modules from non-standard paths, allowing malicious code to execute under a trusted application’s identity.

The true scale of damage becomes clear quickly, as attackers used Windows Remote Management (WinRM) to pivot toward high-value targets like domain controllers and used the file-sync tool Rclone to transfer sensitive business documents to external cloud storage.

How DLL Side-Loading Enables Persistent Control

The core infection mechanism in this campaign is DLL side-loading, a technique where attackers exploit the way Windows loads application support libraries.

When a legitimate, digitally signed application starts, Windows searches for required DLL files in specific folder locations.

Attackers place their own malicious DLLs in those same paths, causing the trusted application to unknowingly load and execute the attacker’s code in its place.

In this campaign, sideloaded modules acted as intermediary loaders that decrypted hidden configuration data stored inside the Windows registry rather than writing anything suspicious to disk.

This behavior closely aligns with intrusion frameworks like Havoc, which use registry-backed storage to preserve encrypted command-and-control (C2) configuration across system reboots and remediation attempts.

Since this activity runs inside a trusted, vendor-signed process, conventional security tools often struggle to flag it as malicious.

Once the C2 channel was active, the compromised process began sending encrypted outbound HTTPS traffic over TCP port 443 to attacker-controlled cloud infrastructure, blending into regular business network activity.

Attackers also installed additional remote management software as a secondary access channel and leveraged WinRM sessions to move laterally across the network toward identity systems.

Organizations should take the following actions to reduce exposure from this attack type.

  • Treat unsolicited external Teams contact from claimed IT staff as suspicious and verify through known internal channels first.
  • Restrict Quick Assist and remote management tools to authorized IT roles only.
  • Enable Attack Surface Reduction (ASR) rules and Windows Defender Application Control (WDAC) to prevent DLL sideloading from user-writable locations like ProgramData and AppData.
  • Enforce Conditional Access requiring MFA and compliant devices for all administrative sessions.
  • Enable Safe Links for Teams and Zero-hour Auto Purge (ZAP) to retroactively catch malicious messages.
  • Restrict WinRM to authorized management workstations and monitor for Rclone or similar data-sync tools in the environment.
  • Train employees to identify external tenant indicators in Teams and set up a verbal authentication phrase between helpdesk staff and end users.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitphishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

QEMU Becomes Stealth Backdoor for Credential Attackers Turn

Next Post

Lovable AI App Builder API Flaw Exposes Thousands of

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us