Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Microsoft Teams isn’t safe: Hackers are sneaking in through calls

Following the acquisition of access through AnyDesk, the attacker undertook further malicious actions and employed techniques to evade detection

byKerem Gülen
December 17, 2024
in News, Cybersecurity
Home News

Cybercriminals are increasingly utilizing Microsoft Teams to execute vishing attacks aimed at accessing users’ systems. Trend Micro reported a specific incident that involved a series of phishing emails followed by a deceptive Microsoft Teams call. The fraudsters pretended to offer tech support and manipulated a victim into downloading remote access software.

Cybercriminals exploit Microsoft Teams for vishing attacks

The attack commenced with a barrage of phishing emails that targeted the victim’s inbox. Shortly after this initial contact, the attacker initiated a call through Microsoft Teams, masquerading as an employee of a company the victim trusted. During this call, the cybercriminal urged the victim to install a remote support application. The initial suggestion was Microsoft Remote Support, but when the installation encountered problems, the attacker pivoted to AnyDesk, a remote desktop tool commonly exploited by malicious actors.


AnyDesk hacked, reset your passwords immediately

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


Once AnyDesk was installed on the victim’s machine, the attacker gained control over it. They proceeded to deploy various suspicious files, including one identified as Trojan.AutoIt.DARKGATE.D. This malware, delivered via an AutoIt script, enabled the attacker to execute malicious commands and maintain remote control over the system. The attacker executed several commands that gathered detailed information about the victim’s system, employing commands such as systeminfo, route print, and ipconfig /all, which saved the gathered data in a file named 123.txt.

Microsoft Teams isn’t safe. - Hackers are sneaking in through calls
Sequence of events outlining the timeline of the attack (Image: Trend Micro)

Following the acquisition of access through AnyDesk, the attacker undertook further malicious actions and employed techniques to evade detection. For example, AutoIt scripts were utilized to identify and bypass any antivirus software present on the system. Additionally, malicious files were discreetly downloaded and extracted into hidden directories, thereby reducing the likelihood of detection. Among these was a file named SystemCert.exe, which created additional scripts and executables in temporary folders and facilitated further malicious activities.

Fortunately, the attack was thwarted before any sensitive data was exfiltrated. The investigation revealed that, despite the hackers gaining access and leaving behind persistent files and registry entries, no critical information was stolen from the victim. This incident underscores the urgent need for fortified security measures within organizations to defend against such sophisticated threats.

Microsoft Teams isn’t safe. - Hackers are sneaking in through calls
Vision One’s analysis identifying the root cause behind script.a3x and Autoit3.exe creation (Image: Trend Micro)

Best practices to combat vishing attacks

Organizations must adopt comprehensive strategies to mitigate the risks associated with vishing attacks. It is crucial to first verify the claims made by third-party technical support providers. Employees should confirm affiliations before granting any access, which reduces the risk of manipulation by cybercriminals.

Controlling access to remote support tools is another key aspect of a robust security posture. Organizations should consider implementing whitelisting for approved tools like AnyDesk and enforce multi-factor authentication policies for enhanced security. This step adds a necessary layer of protection in preventing unauthorized access.

Employee training is paramount in building awareness around social engineering tactics, including phishing and vishing. Educating staff on recognizing these threats is vital in minimizing their susceptibility to future attacks. Training sessions should focus on the specific techniques used by cybercriminals, as well as practical steps to ensure safety.


Featured image credit: Dimitri Karastelev/Unsplash

Tags: Microsoft Teams

Related Posts

Psychopathia Machinalis and the path to “Artificial Sanity”

Psychopathia Machinalis and the path to “Artificial Sanity”

September 1, 2025
GPT-4o Mini is fooled by psychology tactics

GPT-4o Mini is fooled by psychology tactics

September 1, 2025
AI reveals what doctors cannot see in coma patients

AI reveals what doctors cannot see in coma patients

September 1, 2025
Asian banks fight fraud with AI, ISO 20022

Asian banks fight fraud with AI, ISO 20022

September 1, 2025
Android 16 Pixel bug silences notifications

Android 16 Pixel bug silences notifications

September 1, 2025
Azure Integrated HSM hits every Microsoft server

Azure Integrated HSM hits every Microsoft server

September 1, 2025

LATEST NEWS

Psychopathia Machinalis and the path to “Artificial Sanity”

GPT-4o Mini is fooled by psychology tactics

AI reveals what doctors cannot see in coma patients

Asian banks fight fraud with AI, ISO 20022

Android 16 Pixel bug silences notifications

Azure Integrated HSM hits every Microsoft server

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.