The technical help trap: how intruders use Teams and legitimate tools to move through your network

Published 5 min de lectura 97 reading

Microsoft has launched a warning that should be taken seriously: attackers are exploiting Microsoft Teams' external collaboration functionality to impersonate IT staff or helpdesk and convince employees to give them remote access. The disturbing thing is not so much the spectacular "hack," but the combination of social engineering and legitimate tools that allows the intruders to move through corporate networks without raising the usual suspicion. This alert is detailed in the company's report, which describes how intrusions follow a very concrete and repeatable chain of steps; the complete analysis is available on Microsoft's security blog Here..

The typical starting point is a message from outside the Teams tenant: a cross-chat in which the attacker identifies himself as a technician, mentions an alleged account problem or a critical update and asks to start a remote support session. If the victim accepts, tools like Quick Assist (the Windows remote assistance application) deliver the attacker direct control of the committed team, and from there begins the silent climbing. To understand why this vector is so effective it should be remembered that many employees consider applications for technical assistance legitimate and, on days of work pressure, it is easy to fall into the trap.

The technical help trap: how intruders use Teams and legitimate tools to move through your network
Image generated with IA.

Once inside, the attackers perform a quick recognition with Command Prompt and PowerShell to check privileges, domain membership and network reach, assessing the possibility of moving laterally to more valuable systems. They then place a small package of components on user's writing permission routes, for example ProgramData, and manage to run malicious code using signed and trusted applications through the technique known as DLL side-rolling. This use of legitimate binaries and digital signatures is what makes malicious communication and subsequent activity confused with normal traffic and tasks. If you want to look into how this technique works, the MITRE knowledge base describes it in detail in its ATT & CK catalogue: DLL Side-Loading (MITRE ATT & CK).

Command and control communication is usually done on HTTPS, which is mixed with the rest of the outgoing traffic and makes it difficult to detect it by traditional network controls. With persistence assured by changes in the Windows Registry, operators abuse Windows Remote Management (WinRM) to reach other equipment linked to the domain and sometimes attack high-value assets such as domain controllers. WinRM, designed for legitimate remote administration, thus becomes the pipe that facilitates the spread in corporate environments. Microsoft and the official technical documentation on WinRM explain its operation and safety considerations in: Windows Remote Management (WinRM) - Microsoft Docs.

In the final stages of the attack, the intruders deploy additional remote management tools in systems they already have access to to automate data collection and, crucially, use utilities such as Rclone to transfer files to external cloud storage points. The use of Rclone or other legitimate synchronization tools allows you to filter and extract only valuable information, reduce volumes and improve the operating sigil; the tool itself and its public documentation are available at rclone.org which is usually used by these actors to send data outside the perimeter without raising obvious alarms.

This whole process, described by Microsoft as a nine-stage chain in the analyzed cases, shows why "human-operated" intrusions are so dangerous: they are not dependent on a single zero-day explosion, but rather on combining social engineering, legitimate administrative tools and abuses of signed processes to remain hidden. Detecting malicious activity is complicated because many of the actions look like routine IT support or management tasks. The Microsoft report contains catches and a technical tour through these stages that help identify abnormal behavior patterns; you can consult it on your security blog: Cross-tenant helpdesk impersonation playbook.

In this context, the recommendations have to combine technical controls with human prevention. Microsoft insists that external accounts in Teams should be treated by default as unreliable and that managers strictly limit or monitor remote assistance tools. It also recommends restricting the use of WinRM to specific systems and monitoring transfers to external cloud services. For documentation on how to manage external access in Teams and reduce exposure you can serve the official guide: Manage external access in Microsoft Teams - Microsoft Docs.

The technical help trap: how intruders use Teams and legitimate tools to move through your network
Image generated with IA.

In addition to configuration measures, there are good operational practices that mitigate risk: educating employees to verify the identity of those who request alternative channel support, requiring additional checks for remote sessions and activating security controls that alert about atypical executions of signed applications, persistent changes in the Register and unusual use of file synchronization tools. Endpoints detection and response solutions (EDR) and white list implementation policies also make it difficult to carry out payloads through legitimate binaries.

It is not a unique or miraculous solution: defending itself against this type of campaign requires continuous monitoring, network segmentation, reduced use of accounts with permanent privileges and stricter management schemes (e.g. just-in-time access or workstations dedicated to administrative tasks). The general pattern is to raise suspicion in the face of unexpected support requests and reduce an attacker's ability to use legitimate tools as an attack lever.

If you manage an organization, review the external collaboration policies in Teams, assess who can start or accept remote attendance sessions and set up alerts to detect unusual patterns. For technical equipment, it is appropriate to review PowerShell and WinRM logs, audit Registry modifications and control processes that start outgoing HTTPS connections to unusual domains. The combination of training, administrative controls and behavior-based detection is the best defense against a class of intrusion that takes advantage of our confidence in everyday tools.

Coverage

Related

More news on the same subject.