Hackers have been posing as IT support on Microsoft Teams
The social engineering campaign combines a traditional email spam campaign with Microsoft Teams-based manipulation


Security researchers have warned about an ongoing threat campaign where hackers are posing as IT support technicians to trick unsuspecting users.
A new report from Reliaquest detailed how after responding to a security alert it discovered a “campaign of escalated social engineering tactics originally associated with the ransomware group ‘Black Basta’.”
The report outlined a shift in tactics in late October 2024 from mass spam email events to using Microsoft Teams messages. Reliaquest noted the scale of the initial email campaign, stating that in one incident alone it observed approximately 1,000 emails sent within the space of just 50 minutes targeting a single user.
Due to patterns in the domain creation and Cobalt Strike configurations used in the attacks, the report attributed the campaign to Black Basta with high confidence.
Following the mass email spam events, targets were then added to Microsoft Teams Chats with external users, who operated from Entra ID tenants created to mask themselves as IT support, admin, or help desk professionals.
Reliaquest found the threat actors generally originated from Russia, with the time data logged by Teams reflecting they were located in the Moscow time zone.
The attackers’ intent was to convince users to download the remote monitoring and management (RMM) tool, AnyDesk, which would give them initial access to the target environment with the ultimate aim of deploying ransomware.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Similarly, the report noted it had identified several listings on the dark web advertising their email spam services, which were found available for anywhere from $10 – $500.
Black Basta observed rapidly evolving their TTPs
Reliaquest added that when analyzing recent incidents, it observed the threat actors adapting their TTPs, using Microsoft QuickAssist instead of AnyDesk to take control of the user’s machine.
Additionally, the group were observed using QR codes to phish the victims when they were communicating over Teams. The malicious domains linked to the QR codes were often generic but the report noted some were tailored to match the targeted organization, such as ‘companyname.qr–s1[.]com’.
Tracking these domains, researchers estimate that the threat actor started using or was planning on using the qishing technique since early October.
To mitigate against tactics involving Microsoft Teams and ‘qishing’, the report recommended organizations disable communication from external users within Teams.
In cases where communication with external users is required, businesses can whitelist specific trusted domains.
As previously noted, the attacker typically set their names to ‘help desk’, which is often surrounded by whitespace characters, which the report stated is likely to center the name within chats. This means when searching for these accounts organizations should search for ‘contains’ rather than a direct match to identify potentially malicious actors.
Organizations should also ensure that logging is enabled for their employees' Team chats, particularly the ChatCreated event, which can help and investigate potentially malicious activities.
Reliaquest added that while the campaign is still evolving, and Black Basta has demonstrated its ability to rapidly adapt their TTPs, the group’s post-exploitation activities remain largely similar, relying on the deployment of Cobalt Strike Beacons and Impacket abuse.
As such, existing security tools and detection rules should be able to pick up this activity. Reliaquest urged organizations to ensure employees remain vigilant against current social engineering tactics by focusing training and awareness programs that highlight the latest threats and techniques.

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
So long, Defender VPN: Microsoft is scrapping the free-to-use privacy tool over low uptake
News Defender VPN, Microsoft's free virtual private network, is set for the scrapheap, so you might want to think about alternative services.
By Nicole Kobie Published
-
Hackers are on a huge Microsoft 365 password spraying spree – here’s what you need to know
News A botnet made up of 130,000 compromised devices has been conducting a huge password spraying campaign targeting Microsoft 365 accounts.
By Solomon Klappholz Published
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz Published
-
Microsoft is increasing payouts for its Copilot bug bounty program
News Microsoft has expanded the bug bounty program for its Copilot lineup, boosting payouts and adding coverage of WhatsApp and Telegram tools.
By Nicole Kobie Published
-
Hackers are using this new phishing technique to bypass MFA
News Microsoft has warned that a threat group known as Storm-2372 has altered its tactics using a specific ‘device code phishing’ technique to bypass MFA and steal access tokens.
By Solomon Klappholz Published
-
A new phishing campaign is exploiting Microsoft’s legacy ADFS identity solution to steal credentials and bypass MFA
News Researchers at Abnormal Security have warned of a new phishing campaign targeting Microsoft's Active Directory Federation Services (ADFS) secure access system.
By Solomon Klappholz Published
-
Hackers are using Microsoft Teams to conduct “email bombing” attacks
News Experts told ITPro that tactics like this are on the rise, and employees must be trained effectively
By George Fitzmaurice Published
-
Microsoft files suit against threat actors abusing AI services
News Cyber criminals are accused of using stolen credentials for an illegal hacking as a service operation
By Solomon Klappholz Published