September 23, 2025
5
min read

Microsoft Teams Becomes the New Vishing Battleground

Microsoft Teams has recently emerged as a critical attack vector for sophisticated ransomware campaigns, with threat actors weaponizing enterprise communication platforms through coordinated vishing operations. This strategic analysis examines the three-stage attack methodology—email flooding, social engineering via Teams calls, and remote access tool deployment—that has enabled groups like Black Basta, Storm-1811, and Midnight Blizzard to achieve unprecedented operational success. Recent intelligence reveals over 15 documented incidents in three months, with attack frequency accelerating significantly. The exploitation centers on default Microsoft Teams configurations that permit external communications, creating opportunities for attackers to impersonate IT support during manufactured crises. Command Zero's post-Black Hat platform enhancements deliver comprehensive investigative capabilities across Microsoft Teams, Entra, and Graph environments, providing security teams with advanced detection and response tools. Organizations must implement systematic defense frameworks combining technical infrastructure controls with human-centric security operations to address this paradigmatic shift in adversarial methodology that blurs traditional boundaries between technical exploitation and social engineering mastery.

Eric Hulse
Director of Security Research
In this article

Introduction

Enterprise instant communication tools have long been considered a safe and controlled environment. Well, that is until attackers decided to target them with creative new attack vectors. Microsoft Teams—the backbone of enterprise collaboration—has become a primary attack vector for sophisticated ransomware campaigns targeting organizations worldwide. What began as isolated incidents has evolved into coordinated operations that exploit the intersection of technical vulnerabilities and human psychology.

The Mechanics of Modern Vishing

Modern Vishing targeting Teams isn't traditional phishing. We're witnessing engineered precision—a three-stage operation that weaponizes trust and manufactured urgency:

Email Flooding as Psychological Primer

Attackers initiate massive spam bombardments—hundreds of messages within minutes—creating operational chaos that primes targets for subsequent exploitation. Sophos MDR has observed more than 15 incidents involving these tactics in the past three months, with half of them in the past two weeks, indicating rapid acceleration.

Exploitation of Communication Trust Channels

The follow-up Teams call from the attackers appears legitimate and timely. Attackers present as IT support, demonstrating knowledge of the ongoing "problem" while offering immediate remediation. In documented cases, "As the [target] organization used a managed service provider for IT services, this did not set off red flags with the employee who accepted the [Microsoft Teams] video call [from an account named 'Help Desk Manager' from an external Microsoft 365 tenant]."

Remote Access Deployment and System Compromise

Through social engineering on the Teams call, attackers convince targets to install remote access tools—Quick Assist, AnyDesk, or TeamViewer. This provides complete system access, enabling malware deployment, credential harvesting, and lateral movement establishment.

Technical Architecture of the Exploitation

The attack succeeds by exploiting a critical Microsoft Teams misconfiguration that is common across Teams instances. Default settings permit external users to initiate communications with internal users—a configuration that organizations consistently fail to remediate.

Intelligence analysis reveals two distinct threat groups demonstrating sophisticated operational capabilities:

STAC5143: Advanced SharePoint Weaponization

One group – tracked as STAC5143, possibly related to FIN7 (though targeting orgs "smaller and in different business sectors than FIN7's usual victims") – tricks the targets into allowing a remote control session through Teams. They use this access to open a command shell and drop files and execute malware from an external SharePoint file store.

STAC5777: Legitimate Tool Subversion

The other group – tracked as STAC5777, and using techniques, tools, and procedures similar to those used by Storm-1811 – instructs the target employee to download Microsoft's Quick Assist remote access tool, and then proceeds to use the access to make configuration changes and deploy "a legitimate Microsoft updater with a malicious side-loading DLL that provides persistence, steals credentials, and allows for discovery of network resources." This group has successfully deployed Black Basta ransomware in documented cases.

Strategic Attribution and Scale Assessment

Multiple sophisticated threat actors are leveraging this mechanism: Black Basta Ransom Group, Storm-1811 Cluster, Midnight Blizzard, and Storm-2372. The rapid cross-group adoption indicates exceptional effectiveness and operational scalability.

The sophistication demonstrated—from precision-timed email bombardments to convincing technical impersonations—reveals that modern threat actors possess deep understanding of both technical vulnerabilities and human behavioral psychology.

Command Zero's Strategic Response

Our post-Black Hat engineering initiative delivered comprehensive Microsoft integration enhancements, fundamentally expanding investigative capabilities across Microsoft Teams, Microsoft Entra, and Microsoft Graph environments.

Since August, the Command Zero platform provides unprecedented visibility into communication-based threats:

  • Early-stage Attack Identification: New investigative queries designed to trace suspicious Teams calls, identify external callers impersonating IT support, and correlate call timing with email bombing incidents
  • Remote Access Tool Detection: Enhanced visibility into Quick Assist, AnyDesk, and TeamViewer deployments, including installation timelines and correlation with suspicious Teams activity
  • Lateral Movement Analysis: Advanced capabilities to follow the attack chain from initial Teams contact through network reconnaissance and credential theft
  • Comprehensive Teams Security Assessment: Deep environment visibility enabling investigation of security incidents, HR cases, and operational auditing

These capabilities extend beyond security operations, supporting organizational requirements including compliance investigations and operational auditing—transforming how teams investigate complex, multi-stage attacks.

How to Defend Against Microsoft Teams Vishing Attacks: A Systemic Defense Framework

Organizations must implement comprehensive strategies addressing both technical architecture and human operational elements:

Technical Infrastructure Controls:

  • Restrict external Teams communications to explicitly approved organizational domains
  • Deploy application control frameworks preventing unauthorized remote access installations
  • Implement advanced behavioral monitoring for suspicious communication patterns

Human-Centric Security Operations:

  • Establish verified communication channels for all IT support interactions
  • Deploy comprehensive social engineering awareness programs specifically addressing Teams-based attacks
  • Create organizational protocols that validate support requests through independent verification

Strategic Implications for Security Operations

This campaign represents a paradigmatic shift in adversarial methodology. Threat actors are systematically weaponizing trusted communication infrastructures, exploiting psychological manipulation of manufactured crises, and leveraging default configurations that prioritize operational convenience over security architecture.

Organizations failing to address this hybrid threat model will continue experiencing compromise from increasingly sophisticated campaigns that blur the lines between technical exploitation and social engineering mastery.

Next Steps & Vision for Resilient Communications Security

As we continue monitoring this evolving threat landscape, our strategic approach remains focused on empowering security professionals with advanced investigative capabilities. The most sophisticated technical controls cannot independently protect against attacks that exploit fundamental human tendencies toward collaboration and assistance.

Command Zero’s philosophy centers on providing security teams with comprehensive visibility and actionable intelligence, enabling proactive identification of communication-based threats while supporting broader organizational security operations.

The future of cybersecurity operations demands solutions that seamlessly integrate technical detection capabilities with human behavioral understanding. Microsoft Teams vishing attacks represent just the beginning of this evolution—and we're uniquely positioned to address these challenges through continued innovation and strategic vision.

The question isn't whether your organization will face a Microsoft Teams vishing attempt—it's whether you'll be prepared to detect, investigate, and respond when sophisticated adversaries weaponize your most trusted communication platforms.

Book a demo today to see how Command Zero can help identify and analyze active threats in your environment.    

Eric Hulse
Director of Security Research

Continue reading

Identity-investigations
Highlight

Command Zero & Okta Identity Threat Protection: Level-up Identity Investigations

The integration between Command Zero and Okta Identity Threat Protection (ITP) delivers a transformative solution for security operations teams facing evolving identity-based threats. This powerful partnership connects Okta's real-time identity risk signals with Command Zero's comprehensive investigation capabilities, creating a unified workflow that dramatically enhances threat response. Security teams gain the ability to instantly launch investigations from Okta alerts, correlate identity events across their security stack, leverage automated investigation workflows, and access comprehensive user risk profiles. The integration transforms how organizations respond to identity threats—including phishing, credential stuffing, and session hijacking—which the 2025 Verizon DBIR identifies as central to 22% of breaches. By operationalizing Okta ITP within Command Zero's platform, security teams accelerate response times, investigate complete user journeys, and implement targeted remediation based on comprehensive intelligence. This integration serves as a force multiplier for SecOps teams, reducing mean time to respond while providing the contextual insights needed to counter modern identity-based attacks efficiently.
Eric Hulse
May 21, 2025
4
min read
Identity-investigations
Highlight

Investigating Risky Sign-ins: Getting to the right answers fast

Entra risky sign-ins—suspicious login activities that can often indicate account compromise. We examine the sophisticated detection mechanisms that identify authentication anomalies, from impossible travel scenarios to password spray attacks, and reveal the critical investigation challenges security analysts face. The post showcases how Command Zero's integrated platform transforms these investigations through cross-product visibility, facet-based investigation frameworks, and identity correlation capabilities. By combining an encoded knowledge base with expert language models and strategic automation, security teams can dramatically accelerate threat response times, standardize investigation quality, and gain comprehensive visibility across fragmented technology stacks—ultimately transforming how organizations detect and respond to potential identity compromises.
Natalie Dean
Mar 26, 2025
6
min read
Identity-investigations
Highlight

Investigating Locked Accounts: Making sense of the canary in the coal mine

Locked accounts, often overlooked in security operations, can be crucial indicators of larger security threats. This blog post explores why these common occurrences matter and how they serve as early warning signs for potential issues like brute force attempts, credential stuffing, insider threats, and misconfigured systems. The post also covers how Command Zero streamlines investigations by offering visual analysis, unified data sources, and automated timeline generation. By centralizing the process and leveraging advanced tools, security teams can more efficiently identify and respond to potential threats. The future of threat hunting lies in automation and autonomous investigations, pushing the boundaries of what's possible in cybersecurity.
Alfred Huger
Mar 13, 2025
5
min read
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.