top of page

Microsoft Teams Impersonation Campaign Deploying A0Backdoor via Social Engineering and DLL Sideloading

March 17th, 2026

High

Our Cyber Threat Intelligence Unit is monitoring an active social engineering campaign that exploits Microsoft Teams to gain unauthorized remote access to corporate systems. BlueVoyant assesses this activity to align with Blitz Brigantine (also known as Storm-1811 and STAC5777), a financially motivated threat cluster associated with the Black Basta social engineering playbook. The campaign has targeted financial and healthcare organizations. Attackers impersonate internal IT support on Microsoft Teams, often after launching a mass email bombing campaign to overwhelm targets and prompt them to seek help. Victims are persuaded to open Microsoft Quick Assist and approve a remote session, allowing attackers to gain interactive control of their workstations. Attackers then deploy digitally signed MSI installer packages hosted on Microsoft's personal cloud storage, disguised as legitimate Microsoft Teams or Windows components. These packages execute a DLL sideloading chain that installs A0Backdoor, a memory-resident backdoor that communicates covertly through DNS tunneling. By abusing trusted collaboration tools, legitimate remote-support utilities, and signed installer packages hosted on Microsoft infrastructure, attackers can bypass traditional phishing defenses. Organizations should consider Microsoft Teams a potential initial access vector and strengthen monitoring of collaboration platforms, remote-support activity, and DNS telemetry accordingly.

Technical Details

Threat Type: Social Engineering / Collaboration Platform Phishing / Remote Access Abuse / Backdoor Deployment

Severity: High

Affected Environment: Windows Systems (Finance and Healthcare Sectors)

Malware Family: A0Backdoor

Threat Actor: Blitz Brigantine (also tracked as Storm-1811 and STAC5777); assessed with moderate-to-high confidence per BlueVoyant

Attack Chain:

  • Initial Access: Email Bombing and Teams Impersonation

    • Threat actors begin by flooding the target's inbox with high-volume spam emails, creating confusion and prompting the victim to seek IT support.

    • Shortly after the email bombing begins, attackers contact the victim via Microsoft Teams, impersonating internal IT help desk personnel and offering to resolve the ongoing email issue.

    • The attacker persuades the victim to open Microsoft Quick Assist and approve a remote session.

      • Once the victim grants approval, the attacker requests and obtains full interactive control of the workstation.

  • Payload Delivery: Signed MSI Installers via Microsoft Cloud Storage

    • After gaining remote access, attackers deploy digitally signed MSI installer packages disguised as Microsoft Teams components, Windows Phone Link updates, CrossDeviceService packages, or Cross Device Add-in installers.

      • Confirmed MSI sample names include Update.msi and UpdateFX.msi.

    • These installer files are hosted on Microsoft's personal cloud storage using tokenized links, which increase perceived legitimacy and complicate forensic collection.

    • Installers drop files into user AppData paths that mimic legitimate Microsoft software directory structures, making malicious components appear consistent with expected system file locations.

  • Execution: DLL Sideloading

    • A confirmed sample, Update.msi, places a malicious hostfxr.dll alongside a legitimate Microsoft-signed .NET binary.

      • When the legitimate binary executes, it loads the malicious DLL instead of the authentic component, allowing the attacker's loader to run within a trusted application context.

    • The loader uses advanced anti-analysis measures: It checks for sandbox environments, including QEMU artifacts, spawns a large number of threads to disrupt debuggers, and uses a time-based decryption method that generates the correct decryption key only within 55 hours of deployment.

    • If the execution environment appears anomalous, the loader alters its keying logic and fails to decrypt, complicating analysis under conditions different from the original deployment.

  • Post-Compromise: A0Backdoor and DNS Tunneling C2

    • If anti-analysis checks pass, the loader deploys A0Backdoor directly into memory.

      • This memory-resident backdoor does not write a persistent payload to disk, making it harder for traditional antivirus scanning to detect.

    • A0Backdoor fingerprints the compromised host, collecting username and system or device information before establishing command-and-control communications.

    • Instead of beaconing directly to the attacker's infrastructure, A0Backdoor establishes a covert command-and-control channel via DNS tunneling.

      • It achieves this by sending MX record queries that contain encoded command-and-response data within DNS label structures to public recursive resolvers such as 1.1.1.1 and 8.8.8.8.

        • This method allows malicious traffic to disguise itself as ordinary mail routing lookups, potentially evading controls that are focused on detecting DNS tunneling over TXT records.

        • Using previously registered domains, rather than new ones, further reduces the likelihood of detection by automated filters that flag recent registrations.

    • Based on observed Storm-1811 tradecraft, post-compromise activity may include credential and access token harvesting, lateral movement to additional internal systems, and deployment of follow-on tooling such as QakBot, Cobalt Strike, SystemBC, and ultimately Black Basta ransomware.

      • However, these steps are not confirmed in every A0Backdoor intrusion reported by BlueVoyant.

Image by ThisisEngineering

Impact

  • Unauthorized Remote Access: Employees may unknowingly grant attackers full interactive control over corporate workstations through legitimate remote support tools, bypassing endpoint detection controls.

  • Credential and Token Theft: Compromised systems may expose authentication tokens, passwords, and sensitive account data, potentially allowing further access across the enterprise, consistent with historical Storm-1811 behavior.

  • Lateral Movement: Established access may serve as a foothold for traversal into additional internal systems, expanding the attacker's reach beyond the initially compromised endpoint.

  • Persistent Backdoor Access: A0Backdoor provides memory-resident, covert access enabling long-term attacker presence and facilitating follow-on operations, including ransomware staging.

  • Operational Disruption: A subsequent ransomware deployment or a broad network compromise may disrupt business operations and require extensive remediation.

  • Regulatory and Reputational Risk: Data exposure incidents, particularly in the finance and healthcare sectors, may trigger regulatory obligations and erode stakeholder trust.

Detection Method

  • Collaboration Platform and Remote Access Abuse:

    • Monitor Microsoft Teams logs for inbound messages from external tenants impersonating internal IT support staff or requesting urgent technical assistance.

    • Detect abnormal invocations of Microsoft Quick Assist (quickassist.exe) initiated by non-IT users, or initiated outside of normal business hours or established support workflows.

    • Investigate authentication logs for unusual remote session approvals correlated with prior email flooding activity.

  • MSI Installer Execution:

    • Alert on execution of MSI installer packages launched from user-writable paths, including Downloads, Desktop, AppData\Local, and AppData\Roaming directories.

    • Inspect the signing certificate chain of executed MSI files. Digitally signed packages originating from unexpected publishers or hosted on personal cloud storage should be treated as suspicious.

    • Flag execution of installer files matching known sample names associated with this campaign, including Update.msi and UpdateFX.msi.

    • Review Windows Installer event logs for relevant activity:

      • Event ID 11707: MSI product installation completed

      • Event ID 11724: MSI product removal

  • DLL Sideloading:

    • Detect instances where legitimate signed applications load DLL files from non-standard or user-writable directories, particularly where the loaded DLL is not Microsoft-signed or does not match the expected file hash.

    • Monitor for hostfxr.dll loaded from AppData paths or any location other than the standard .NET runtime directory (e.g., C:\Program Files\dotnet).

    • Investigate parent-child process relationships where Microsoft-signed binaries spawn unexpected child processes or exhibit anomalous network activity.

  • DNS Tunneling Command-and-Control:

    • Monitor for high-volume or persistent MX record DNS queries directed toward public recursive resolvers (1.1.1.1, 8.8.8.8) from endpoints that do not normally generate mail routing lookups.

    • Inspect DNS query label structures for anomalously long or encoded subdomain strings that may indicate tunneled data.

    • Correlate unusual DNS MX query patterns with recent MSI installer execution events or Quick Assist sessions to identify potential A0Backdoor activity.

    • Detection controls tuned exclusively to TXT-record DNS tunneling may not flag MX-based tunneling; update detection logic accordingly.

Indicators of Compromise

Type 

Indicator 

Description 

SHA-256 

0c99481dcacda99014e1eeef2e12de3db44b5db9879ce33204d3c65469e969ff 

Update.msi sample identified by BlueVoyant 

SHA-256 

26db06a2319c09918225e59c404448d92fe31262834d70090e941093e6bb650a 

Malicious hostfxr.dll associated with DLL sideloading chain 

Domain 

fsdgh[.]com 

C2 domain disclosed by BlueVoyant 

Domain 

my[.]microsoftpersonalcontent[.]com 

Microsoft personal cloud storage domain used for tokenized MSI delivery 

 

mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

Organizations should take the following actions to reduce exposure to this campaign:

  • Restrict or disable Microsoft Quick Assist on endpoints where remote IT support functionality is not operationally required.

    • Where Quick Assist must remain enabled, enforce approval workflows that verify the requesting party's identity via an out-of-band channel before permitting the initiation of a session.

  • Configure Microsoft Teams to restrict or flag inbound communications from external or unrecognized tenants.

    • Establish policies that require employees to verify IT support requests through official channels before approving any remote access session.

  • Deploy or tune EDR solutions to detect suspicious MSI installer execution from user-writable directories, DLL sideloading behavior, and memory-resident payloads that do not correspond to installed applications.

  • Update DNS-based detection logic to flag anomalous MX record query volumes or encoded subdomain patterns sent to public resolvers (1.1.1.1, 8.8.8.8) from endpoints not involved in mail routing.

  • Review and harden Microsoft Teams external access and guest access policies.

    • Where not required, disable inbound communication from users outside the organization's tenancy.

  • Enforce multi-factor authentication on collaboration platforms, remote-support access flows, and all administrative accounts to limit the impact of credential compromise.

  • Conduct targeted employee security awareness training that specifically addresses social engineering via collaboration platforms, not exclusively email-based phishing scenarios.

  • Maintain isolated, regularly tested backups to support rapid recovery in the event that ransomware deployment follows an A0Backdoor intrusion.

Conclusion

The A0Backdoor campaign, assessed to align with Blitz Brigantine (Storm-1811 / STAC5777), shows a deliberate advancement of the Teams-based social engineering tactics tracked since 2024. The use of digitally signed installers on Microsoft cloud infrastructure, a time-locked loader with strong anti-analysis measures, and MX-record DNS tunneling for command-and-control reflects improved operational security. Organizations should recognize Microsoft Teams as a proven initial-access vector and ensure defensive measures include collaboration-platform monitoring, remote-support-tool governance, DLL-integrity validation, and DNS behavioral analytics. Ongoing monitoring and rapid incident response are critical to prevent Blitz Brigantine from establishing persistent access, which often precedes ransomware deployment.

bottom of page