Cyber Security News

Hackers Use Microsoft Teams Chats to Deliver Malware to Windows PCs

A sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams chats to infiltrate Windows PCs with malware, according to a recent report by cybersecurity firm ReliaQuest.

The attack, which began surfacing in March 2025 and primarily targets the finance and professional services sectors, signals a dramatic evolution in tactics used by threat actors linked to the notorious “Storm-1811” group, known for deploying the Black Basta ransomware.

A New Twist on Familiar Phishing

Attackers initiate the breach by impersonating internal IT support staff via Microsoft Teams, using fraudulent Microsoft 365 accounts such as “Technical Support.”

These chats are precisely timed—often during late afternoons when employees’ vigilance is lower—and are aimed at high-level targets like directors and vice presidents.

XSS users responding to TypeLib hijacking researchXSS users responding to TypeLib hijacking research
XSS users responding to TypeLib hijacking research

Strikingly, the campaign also appears to selectively target employees with female-sounding names, possibly exploiting perceived susceptibility to social engineering tricks.

Victims are coaxed into launching a remote support session using Windows’s built-in Quick Assist tool. Once inside, attackers deploy an advanced persistence mechanism to ensure ongoing access to the compromised system.

Novel TypeLib Hijacking: A First in the Wild

The most alarming aspect of the attack is the use of a previously unseen persistence technique: TypeLib Component Object Model (COM) hijacking.

Explorer.exe refencing the Internet Explorer COM object

The attackers modify Windows registry entries tied to Internet Explorer components so that every time a related process runs—such as “Explorer.exe” on system startup—a remote script is executed.

This script, hosted on Google Drive, delivers the final malware payload without arousing antivirus alarms.

Backdoor result on VirusTotal, showing low malicious scoring

“This is the first time we’ve observed TypeLib hijacking exploited at scale in the wild,” noted ReliaQuest researchers. “It’s a stealthy, persistent method that leverages legitimate Windows functionality, making it incredibly hard to detect and remove.”

A Stealthy and Adaptable Backdoor

Once delivered, the malware deploys a heavily obfuscated PowerShell backdoor. Encapsulated within JScript, it writes and executes evasive PowerShell code, bypassing common security controls.

Early versions of the malware seen in VirusTotal.

Notably, it sends a unique identifier to the attackers via a Telegram bot, signaling successful infection and opening a persistent channel for command and control.

Researchers traced the malware’s iterations back to January 2025, finding early versions disseminated through malicious Bing advertisements, with development logs and testing traffic routed via Latvia—though evidence suggests the operators are likely based in Russian-speaking countries.

Experts warn organizations to restrict external communication on Microsoft Teams, harden Windows registry controls, and monitor for suspicious registry modifications and PowerShell activity.

“This campaign underlines the importance of vigilance even in trusted environments like Teams,” ReliaQuest advised.

As threat groups continuously refine their tactics, enterprises must stay one step ahead to protect critical assets from innovative cyber threats hiding in plain sight.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…

7 hours ago

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…

8 hours ago

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…

8 hours ago

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…

8 hours ago

Radware Cloud Web App Firewall Flaw Allows Attackers to Bypass Security Filters

Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that…

8 hours ago

ESET Reveals How to Spot Fake Calls Demanding Payment for ‘Missed Jury Duty’

ESET, a leading cybersecurity firm, has shed light on one particularly insidious scheme: fake calls…

8 hours ago