Attackers use Microsoft Teams and Quick Assist to deploy stealthy A0Backdoor malware


Attackers are using Microsoft Teams and Windows Quick Assist in a social-engineering campaign that ends with a stealthy malware implant called A0Backdoor. BlueVoyant says the operation starts with email bombing, moves to fake IT support outreach over Teams, and then abuses Quick Assist to gain remote access to the victim’s device.

The campaign matters because it does not rely on a software exploit. It relies on trust. Microsoft has already warned that Storm-1811, a financially motivated group tied by Microsoft to Black Basta activity, used Teams messages and calls to impersonate help desk staff and persuade users to launch Quick Assist sessions.

BlueVoyant links the newly observed A0Backdoor activity cluster to Blitz Brigantine, also known as Storm-1811 and STAC5777, with moderate to high confidence. The company says the attackers targeted finance and healthcare organizations and used a refreshed toolset designed to blend into enterprise environments and avoid controls built to catch older patterns.

Contents of Update.msi file (Source – BlueVoyant)

How the attack works

The attack begins with spam flooding. BlueVoyant says the threat actor overloads a target’s inbox, then contacts the user through Microsoft Teams while pretending to be internal IT staff offering help. Once the user accepts the story, the attacker asks them to open Quick Assist and share access to the machine.

Microsoft’s earlier threat intelligence matches that playbook closely. The company said Storm-1811 used Teams to send messages and place calls while posing as “Help Desk,” “Help Desk IT,” “Help Desk Support,” or “IT Support,” then pushed victims into Quick Assist sessions that led to malicious downloads and follow-on compromise.

DIE identifying compressed or packed data within hostfxr.dll (Source – BlueVoyant)

BlueVoyant says the malware then arrives as a signed MSI package disguised as a legitimate Microsoft-related application, including names such as Microsoft Teams or CrossDeviceService. That package installs a legitimate-looking executable alongside a tampered hostfxr.dll, which lets the attackers trigger DLL sideloading and execute malicious code under the cover of a trusted process.

What makes A0Backdoor difficult to spot

According to BlueVoyant, the malicious loader includes anti-sandbox behavior and decrypts payload data before handing execution to shellcode. The researchers also say the malware checks firmware tables for strings such as “QEMU,” which helps it detect virtualized analysis environments.

BlueVoyant also says the backdoor avoids obvious outbound connections to attacker infrastructure. Instead, its command-and-control traffic uses DNS mail exchange queries and public recursive resolvers, including 1.1.1.1, which can make malicious traffic look more normal and harder to flag during routine monitoring.

That stealth layer matters because many defenders focus on web traffic, downloads, or newly registered command-and-control domains. BlueVoyant says the operators re-registered older lapsed domains instead of relying only on fresh infrastructure, which could help them slip past detections tuned to newly created or algorithmically generated domains.

Decryption Routine Contained within hostfxr.dll (Source – BlueVoyant)

Key facts at a glance

ItemDetails
Initial lureEmail bombing followed by fake IT outreach on Microsoft Teams
Remote access methodWindows Quick Assist
Malware deliverySigned MSI installers posing as legitimate Microsoft-related software
Execution methodDLL sideloading through a malicious hostfxr.dll
Suspected actor overlapBlitz Brigantine / Storm-1811 / STAC5777, tied to Black Basta tradecraft
Noted victimsA Canada-based financial institution and a global health organization, per BlueVoyant

Why this campaign stands out

This campaign shows how effective built-in tools can become in the hands of attackers. Quick Assist is a legitimate Microsoft remote assistance app, and Microsoft’s own support page warns users to use it only with people they trust because the other party can view the screen or control the PC if permission is granted.

Microsoft also says defenders should tighten Teams external access and review whether Quick Assist is truly necessary in their environment. In a fresh incident-response write-up published on March 16, 2026, Microsoft said organizations should restrict inbound communications from unmanaged Teams accounts and remove or disable tools such as Quick Assist where they are not required.

That guidance lines up with the latest Teams security recommendations. Microsoft says Teams is a high-value target because attackers can abuse chat, calls, meetings, and screen sharing at different stages of an intrusion, even when no software vulnerability is involved.

Captured DNS traffic from C2 (Source – BlueVoyant)

What defenders should do now

  • Restrict inbound Teams communication from unmanaged or untrusted external domains. Microsoft says admins can allow only specific external domains in Teams.
  • Review whether Quick Assist is needed. Microsoft says admins can disable it by blocking the remoteassistance.support.services.microsoft.com endpoint.
  • Train employees to verify any IT support contact that arrives over Teams before granting remote access. This recommendation follows directly from Microsoft’s and BlueVoyant’s attack descriptions.
  • Watch for suspicious MSI installers appearing in user-writable locations and for unusual DLL sideloading chains involving hostfxr.dll. BlueVoyant and Microsoft both describe MSI-delivered sideloading activity in this type of compromise.
  • Monitor DNS traffic for unusual MX lookups and resolver usage patterns. BlueVoyant says A0Backdoor uses DNS MX-based command-and-control to reduce direct contact with attacker servers.

FAQ

What is A0Backdoor?

A0Backdoor is a malware family BlueVoyant says it discovered during investigations into Teams and Quick Assist social-engineering attacks. The company describes it as a new backdoor delivered through DLL sideloading after attackers gain remote access.

How do the attackers get in?

BlueVoyant says they first spam-bomb the victim’s inbox, then pose as IT support over Microsoft Teams and convince the user to open a Quick Assist session.

Is Microsoft Teams itself vulnerable?

The reporting points to abuse of legitimate collaboration features, not a newly disclosed Teams software flaw. Microsoft says these attacks exploit trust, collaboration platforms, and built-in tools rather than relying on a traditional vulnerability.

Why is the malware stealthy?

BlueVoyant says the attackers use signed MSI files, DLL sideloading, anti-sandbox checks, and DNS-based command traffic through public resolvers. Those choices make the activity blend in better with normal enterprise behavior.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages