Vishing Attack Exploits Microsoft Teams & Quick Assist, Bypasses Security with Social Engineering

Sophisticated Vishing Attack Exploits Microsoft Teams and Quick Assist to Deploy Malware

In November 2025, a sophisticated voice phishing (vishing) campaign successfully infiltrated a corporate environment by exploiting Microsoft Teams and the built-in Windows tool, Quick Assist. This attack underscores a growing trend where cybercriminals leverage trusted communication platforms and social engineering to bypass traditional security measures.

Attack Overview

The attackers initiated the campaign by impersonating IT support personnel through Microsoft Teams voice calls. This method capitalizes on the inherent trust employees place in internal communications, making it an effective vector for social engineering.

After two unsuccessful attempts to deceive employees, the attackers succeeded on the third try. They convinced a user to grant remote access via Quick Assist, a native Windows remote assistance utility. This persistence highlights the calculated approach of the attackers, who exploited the urgency and authority associated with IT support requests.

Post-Compromise Actions

Once remote access was established, the attackers directed the compromised user to a malicious website hosting a spoofed credential-harvesting form. Evidence from browser history and Quick Assist session logs confirmed that corporate credentials were entered into this fraudulent portal, initiating a multi-stage payload delivery process.

The initial payload involved a disguised Microsoft Installer (MSI) package that sideloaded a malicious Dynamic Link Library (DLL) using trusted Windows mechanisms. This technique, known as living-off-the-land, allows malicious code to execute under the guise of legitimate software processes, thereby establishing outbound command-and-control (C2) connectivity.

Subsequent payloads expanded the attackers’ foothold, incorporating:

– Encrypted loaders designed to evade detection and deliver secondary stages.

– Remote command execution via standard administrative tools to blend with normal enterprise traffic.

– Proxy-based connectivity to obscure the attackers’ infrastructure and origin.

– Session hijacking capabilities enabling sustained, identity-level control over the environment.

The attack was meticulously crafted to mimic legitimate enterprise activity, minimizing the likelihood of triggering security alerts during the intrusion.

Detection and Response

Upon notification, Microsoft’s Detection and Response Team (DART) confirmed that the compromise originated from the Teams vishing interaction. The team prioritized preventing identity or directory-level escalation.

The investigation revealed that the intrusion was short-lived and limited in scope. DART executed targeted eviction procedures, applied containment controls to restrict lateral movement, and validated the absence of persistence mechanisms before declaring the incident resolved.

Recommendations for Mitigation

To reduce exposure to similar identity-focused attacks, organizations are advised to:

– Restrict Inbound Teams Communications: Limit communications from unmanaged or unverified external accounts by implementing an allowlist of trusted external domains.

– Audit Remote Access Tools: Inventory and assess remote monitoring and management tools, disabling utilities like Quick Assist where not operationally required.

– Conduct Vishing Awareness Training: Educate employees on vishing tactics, particularly those involving IT impersonation within collaboration platforms.

– Enable Conditional Access Policies: Implement policies and session-based anomaly detection to flag unusual remote access activity.

Conclusion

This incident highlights a critical shift in cybercriminal tactics, focusing on exploiting human trust rather than software vulnerabilities. As collaboration platforms become primary attack surfaces, defenders must evolve detection capabilities beyond traditional perimeter-based approaches to effectively counter these sophisticated social engineering attacks.