The Recon SOC is seeing an uptick in ransomware groups successfully gaining initial access to environment's by impersonating IT support staff and calling users directly over Microsoft Teams. This sophisticated social engineering attack leverages the trust users place in familiar communication platforms to bypass traditional security controls.
The attack methodology is deceptively simple yet highly effective: attackers impersonate IT support staff and contact employees through unsolicited Microsoft Teams calls. Using generic display names like "IT Support", these cybercriminals create a sense of legitimacy while maintaining anonymity.
Once the attacker establishes contact, they send unsuspecting users a link to a fraudulent support website designed to harvest their credentials. They will also trick the victim into authorizing multi-factor authentication. The victim is typically told there's an urgent IT issue requiring their attention. They may even have the user share their screen for "troubleshooting" and to help them through the process.
What users don't realize is that the attacker is simultaneously authenticating over the organization's VPN using the harvested credentials and MFA request. By the time the user completes the "support" process, the attacker has already gained authenticated access to the corporate network.
The most critical defense against these attacks is comprehensive user education. Organizations should implement regular security awareness training that specifically addresses:
Microsoft provides built-in controls to help organizations prevent these attacks at the platform level. Administrators can configure Teams to block inbound calls from external, untrusted organizations across the entire tenant.
To configure external access controls in Microsoft Teams:
Additional Microsoft recommendations:
The good news for security teams is that detection is absolutely possible. Microsoft 365 audit logs provide comprehensive visibility into cross-organizational Teams communications, including:
The Cybersecurity and Infrastructure Security Agency (CISA) has published an excellent resource specifically addressing Microsoft 365 logging and threat hunting capabilities. Their implementation playbook provides detailed guidance on:
Essential Resource: Microsoft Expanded Cloud Logs Implementation Playbook