Microsoft Teams as Phishing Infrastructure: The A0Backdoor Campaign and the Industrialization of Collaboration-Platform Attacks

Authors: Cloud Security Alliance AI Safety Initiative
Published: 2026-03-10

Categories: Threat Intelligence, Social Engineering, Endpoint Security, Identity Security, Cloud Security
Download PDF

Microsoft Teams as Phishing Infrastructure: The A0Backdoor Campaign and the Industrialization of Collaboration-Platform Attacks


Key Takeaways

A threat cluster tracked by BlueVoyant as “Blitz Brigantine”—assessed with moderate-to-high confidence as a continuation of the Storm-1811 activity group [13] following the dissolution of the Black Basta ransomware operation—deployed a previously undocumented memory-resident backdoor against confirmed targets in the Canadian financial services sector and a global healthcare organization beginning in August 2025 [1][11]. The malware, designated A0Backdoor, reaches victim machines through a now-mature social engineering chain that begins with inbox flooding, escalates to a Teams impersonation of internal IT support, and concludes with the attacker obtaining screen-sharing access via Windows Quick Assist—a Microsoft-signed remote management tool that endpoint security products rarely flag [1][2]. Once remote access is established, A0Backdoor deploys silently and communicates exclusively through DNS MX-record queries directed at public resolvers, a covert channel designed to blend into normal enterprise DNS traffic and evade detection tooling focused on TXT-record tunneling or direct outbound command-and-control connections [1].

The A0Backdoor campaign is not an isolated incident. Microsoft’s October 2025 threat disruption report named five active threat actor clusters—Storm-1811, Storm-2372, Storm-0324, Storm-1674, and Sangria Tempest—each using Microsoft Teams as a primary delivery or persistence channel, and explicitly characterized Teams’ global adoption and feature richness as properties that make it a “high-value target for both cybercriminals and state-sponsored actors” [3]. A November 2025 disclosure documented a structural security gap in Teams guest access that allows attackers operating low-cost Microsoft 365 tenants to sidestep the victim organization’s Microsoft Defender for Office 365 protections entirely, creating a “protection-free zone” for link delivery and file distribution [4]. Microsoft began rolling out baseline messaging safety protections to all default-configuration tenants in January 2026, but those protections are only as effective as the administrative decisions that configure them, and they do not address the social engineering dimension at the core of the Quick Assist abuse pattern [3][5].

Organizations in regulated verticals—particularly financial services and healthcare, which represent the highest-value ransomware leverage targets—should treat the Quick Assist attack chain as an active, high-likelihood threat requiring immediate administrative and training countermeasures. The attacker’s ability to exploit a legitimate, Microsoft-signed tool means that neither the user nor the endpoint security stack will receive a traditional malware warning at the most critical moment of the attack.


Background

Microsoft Teams as an Enterprise Attack Surface

Microsoft Teams surpassed 320 million monthly active users as of late 2023—the most recently disclosed official Microsoft figure—making it among the most widely deployed enterprise collaboration platforms in the world [5]. Its feature set—persistent chat, voice and video calls, screen sharing, file sharing through SharePoint integration, and extensibility through third-party apps—reflects exactly the capabilities an attacker needs to surveil, communicate with, and ultimately compromise a target organization. Where email phishing has accumulated decades of defensive infrastructure—spam filters, reputation databases, user training, and browser-integrated warnings—Teams arrived as a high-trust channel where messages from apparent colleagues or IT staff carry an implicit legitimacy that email no longer reliably provides.

The weaponization of Teams as a phishing delivery vector began in earnest in July 2023, when Storm-0324, a financially motivated initial access broker, began using a publicly available tool called TeamsPhisher to programmatically send phishing lures containing malicious SharePoint-hosted file links directly through Teams chat [6]. Microsoft documented this activity in September 2023 and implemented default restrictions on external messaging, but the restrictions applied only to Teams-to-Teams communication and did not address the broader guest access model [6]. Subsequent threat actors adapted: rather than relying on TeamsPhisher to deliver static links, they shifted to interactive social engineering in which the attacker impersonates a helpdesk technician and walks the victim through installing remote access software, converting Teams from a file delivery channel into a real-time manipulation platform.

The structural property that enables the cross-tenant phase of these attacks is Teams’ default configuration, which permits external users on other Microsoft 365 tenants to initiate chats and meetings with internal users unless explicitly restricted by policy [4][7]. Threat actors exploit this by registering inexpensive Microsoft 365 tenants—plans such as Teams Essentials or Business Basic that do not include Microsoft Defender for Office 365—and using them to contact targets. Because the resource tenant (the attacker’s) governs the application of Safe Links, Safe Attachments, and Zero-hour Auto Purge to content shared within that tenant’s context, the victim’s organizational Defender policies do not apply when the victim accepts an invitation to that external tenant [4]. The net effect is that a well-resourced organization with premium Defender licensing can be exposed to unscanned phishing content through a $6-per-month Microsoft 365 account registered minutes before the attack.

The Email Bombing Precursor

The A0Backdoor campaign, like the Quick Assist attacks documented by Microsoft in May 2024 and by Sophos in January 2025, begins before the attacker ever contacts the victim on Teams [1][2][8]. The standard precursor is email bombing: the attacker subscribes the target’s business email address to a large volume of newsletter and subscription confirmation services in rapid succession, generating hundreds or thousands of legitimate-but-unwanted messages within a short window. The intent is not to deliver a payload through email—it is to create a crisis state. A user confronted with an inbox that has accumulated several hundred messages in an hour is disoriented, distracted, and actively searching for a resolution, making them significantly more susceptible to an offer of help.

The attacker, having observed or anticipated this disruption, then contacts the victim on Microsoft Teams posing as an IT helpdesk technician or support specialist. The message is contextually credible—it references the email problem the victim is currently experiencing and offers to resolve it. BlueVoyant notes that this sequencing is deliberate: the email flooding establishes the social context that makes the Teams approach appear legitimate, and the Teams message arrives through a channel the victim considers higher-trust than email [1]. Storm-1811 and its successors have refined this two-stage precursor over more than a year of operational use, and Sophos MDR documented more than fifteen incidents following this pattern across a three-month period spanning late 2024 and early 2025 [8].

Quick Assist: A Trusted Tool in an Untrusted Hand

Windows Quick Assist is a remote support application built into Windows 10 and Windows 11 that allows one user to share their screen with or grant full control of their device to another user over an authenticated Microsoft session. It is a legitimate, Microsoft-signed tool, updated through Windows Update, and broadly recognized as a sanctioned IT support mechanism in enterprise environments [2]. These properties make it nearly ideal for abuse: it does not trigger antivirus or endpoint detection and response alerts in the way that a novel remote access tool would, users have generally been trained to expect IT support staff to use it, and its authentication flow—which requires only that the victim provide a six-character session code—places the burden of trust on the human rather than on a technical verification mechanism.

Microsoft Threat Intelligence first formally documented Quick Assist abuse by Storm-1811 starting in mid-April 2024, noting that the tool was specifically selected by attackers precisely because its legitimacy suppresses both technical and human warning signals [2][14]. Once the attacker obtains screen-sharing or remote control access, the victim’s machine is treated as a fully trusted endpoint: the attacker can open command prompts, execute scripts, browse the file system, harvest credentials from memory or credential stores, and install persistent payloads. In the A0Backdoor campaign, that persistent payload is deployed silently while the victim believes a legitimate IT support session is resolving their email problem [1].


Security Analysis

A0Backdoor: Capabilities and Covert Command-and-Control

A0Backdoor is a memory-resident backdoor, meaning it is designed to operate from volatile memory rather than writing its core components to disk in a form that static analysis tools are likely to identify [1]. BlueVoyant’s analysis characterizes it as performing host fingerprinting on initial execution—collecting system and environment information before establishing persistence—as a quality-control measure that allows the operator to assess whether the compromised machine represents a valuable target before committing further tooling [1][11]. This selective persistence pattern is increasingly common among financially motivated threat actors that prioritize operational security: compromising a non-target machine and triggering a detection event creates more risk than walking away from a low-value host.

The most operationally significant characteristic of A0Backdoor is its command-and-control channel. Rather than connecting to a remote IP address over HTTP, HTTPS, or a non-standard port—all patterns that network detection tooling is tuned to identify—A0Backdoor encodes communications within DNS MX-record queries directed at public recursive resolvers such as Cloudflare’s 1.1.1.1 [1]. DNS MX records are used legitimately to identify mail exchange servers for a domain, and DNS resolution traffic to public resolvers is generated continuously by enterprise systems. By encoding data in the labels and responses of MX queries to attacker-controlled domains, A0Backdoor creates a covert channel that flows through the DNS infrastructure that every organization must permit to function. BlueVoyant explicitly notes that this technique differs from DNS TXT-record tunneling—a more commonly documented and more commonly detected pattern—and is specifically designed to evade detection signatures that focus on TXT-based encoding [1].

The combination of memory residency, selective host fingerprinting, and MX-record DNS tunneling represents a meaningful step in operational sophistication over the ransomware-focused payloads that characterize earlier Storm-1811 activity. Black Basta ransomware, which was the primary post-access payload through most of 2024 and into early 2025, generates high-visibility impact events—file encryption, ransom notes, operational disruption—that trigger incident response and containment. A0Backdoor, by contrast, is designed for persistence and quiet data collection, suggesting the operator’s objectives may have shifted toward longer-term access and intelligence gathering rather than immediate monetization through ransomware.

Structural Vulnerabilities in the Teams Platform

The guest access security gap disclosed in November 2025 is distinct from the social engineering dimension of the Quick Assist attack chain, but it compounds organizational exposure in important ways. Microsoft Defender for Office 365’s Safe Links and Safe Attachments protections are enforced by the resource tenant—the tenant that hosts the Teams environment where content is shared—rather than by the tenant that licenses the victim user [4]. An attacker who creates a Microsoft 365 Business Basic or Teams Essentials tenant at minimal cost obtains a functional Microsoft 365 environment without Defender for Office 365. When victim users accept guest invitations to this tenant or receive files shared from it, those files and links pass through the attacker’s tenant context and are not scanned by the victim organization’s Defender policies [4].

This is not a vulnerability in the traditional sense—it is a logical consequence of multi-tenant architecture that Microsoft had not addressed through policy defaults prior to the November 2025 disclosure. The practical implication is that an organization’s investment in Microsoft Defender for Office 365 P2 licensing does not fully protect its users when those users engage with external Teams tenants, a scenario that enterprise workflows increasingly normalize through partner collaboration, vendor onboarding, and contractor access arrangements. The “Chat with Anyone” feature that Microsoft began rolling out in November 2025—extending Teams messaging to any external email address, not just other Teams users—further expands this attack surface without modifying the underlying protection model [4].

Check Point Research disclosed four related vulnerabilities in Teams’ notification and identity handling in 2025, including a notification spoofing vulnerability (CVE-2024-38197) that allowed external users to forge the apparent identity of internal users in certain notification contexts [5]. Microsoft patched these vulnerabilities by October 2025, but their existence during the period of active A0Backdoor campaign activity underscores that platform-level integrity assumptions can compound the impact of social engineering attacks: a user who receives what appears to be a message from a known internal colleague is less likely to apply critical scrutiny to a request to open Quick Assist.

Threat Actor Landscape and Campaign Evolution

The A0Backdoor campaign does not exist in isolation. BlueVoyant’s assessment that Blitz Brigantine represents a continuation of Storm-1811 [13] following the February 2025 leak of Black Basta’s internal communications is consistent with a broader pattern of adaptive reconstitution among financially motivated threat groups [1][9]. The leaked communications disrupted Black Basta’s operational cohesion but distributed its techniques, tooling knowledge, and personnel across successor clusters—a pattern historically observed after the dismantling or dissolution of major cybercriminal operations.

Microsoft’s October 2025 disruption report documented five distinct clusters operating Teams-based attack chains simultaneously, reflecting the degree to which Teams abuse has been industrialized rather than remaining the province of a single actor [3]. Storm-2372, a Russian-linked cluster active since August 2024, operates an entirely different technical pathway—device code phishing through fake Teams meeting invitations—that harvests OAuth authentication tokens rather than relying on remote control access [3][10]. Sangria Tempest, also known as FIN7, participates in the VEILdrive campaign using compromised legitimate accounts to maintain a layer of authentic-looking identity that makes message filtering more difficult [3]. STAC5143, identified by Sophos MDR, copies the email-bombing and Teams-vishing precursor chain but substitutes Java Archive and Python-based backdoors downloaded through attacker-controlled SharePoint for the Quick Assist step, demonstrating that the social engineering methodology is being adopted by actors who vary the technical payload [8].

The convergence of multiple threat actor clusters on Teams as a primary attack vector within an 18-month window is not coincidental. It reflects a rational response to the defensive environment: email phishing has become progressively harder as organizational investment in email security matures, while Teams represents a high-trust, high-availability channel that most organizations have not subjected to the same scrutiny. The asymmetry between the defensive posture of email and the defensive posture of Teams is, for the moment, a structural advantage that threat actors are actively exploiting.

Finance and Healthcare as Priority Targets

Finance and healthcare represent the two sectors with the highest concentration of confirmed A0Backdoor victims identified in BlueVoyant’s August 2025 report, and both sectors have been consistently named across the broader Teams threat landscape documented by Microsoft and Sophos [1][3][8]. The targeting logic is straightforward from an adversarial perspective: financial institutions hold credentials, account access, and transaction authority with direct monetary value, while healthcare organizations hold protected health information and are subject to regulatory consequences that make ransomware-driven operational disruption acutely damaging to both operational continuity and organizational standing.

Financial services organizations are also a natural fit for the IT-impersonation social engineering vector. Large financial institutions run complex technology environments with significant IT support infrastructure; employees are accustomed to receiving helpdesk outreach, may not personally know the support staff contacting them, and are conditioned to respond quickly to operational issues in environments where system availability directly affects business. Healthcare organizations present a complementary vulnerability profile: clinical staff and administrative personnel operating under time pressure may prioritize resolving a reported technical problem over exercising the scrutiny that would reveal an impersonation.

The HIPAA and GLBA regulatory frameworks governing healthcare and financial services respectively impose data protection obligations that do not distinguish between how an intrusion was initiated—a sophisticated zero-day exploit and a social engineering attack that walked the attacker through the front door impose equivalent breach notification and regulatory examination obligations. The A0Backdoor’s memory residency and DNS-tunneled command-and-control may allow it to persist undetected long enough to exfiltrate regulated data before any security event is triggered, substantially increasing the compliance and litigation exposure that follows discovery.


Recommendations

Immediate Actions

Organizations should audit their Microsoft Teams external communication policies now, without waiting for a confirmed incident. The default configuration in most Microsoft 365 tenants permits external users from any domain to initiate chat contact with internal users; restricting this to an approved list of partner and vendor domains removes the primary technical precondition for the cross-tenant phishing approach [3][7]. Tenant-level external access restrictions are configured in the Microsoft Teams Admin Center under External Access settings, and cross-tenant access policies in Microsoft Entra ID (formerly Azure Active Directory) provide a complementary layer of control for guest invitation and collaboration permissions [7].

Quick Assist should be evaluated as a candidate for policy-based restriction in environments where it is not required for IT operations. Microsoft provides Group Policy and Microsoft Intune management policies that can disable Quick Assist on endpoints where the tool serves no legitimate operational function [2]. In environments where Quick Assist is legitimately used by IT support staff, organizations should establish and communicate a verified verification process—for example, requiring that any Quick Assist session be initiated only after a support ticket has been opened through the official ticketing system and confirmed through a second channel, rather than in response to an unsolicited Teams message.

Security operations teams should deploy or tune DNS monitoring to detect MX-record query volumes and patterns inconsistent with mail server resolution—a host issuing MX queries to public resolvers at high frequency, or to domains with no associated legitimate mail infrastructure, warrants investigation as a potential A0Backdoor or similar DNS-tunneling indicator [1].

Short-Term Mitigations

Email bombing is a well-established precursor to the Quick Assist social engineering chain, and its detection provides an early warning window before the Teams impersonation stage. Organizations should configure email security platforms to alert on rapid-volume subscription confirmation traffic and temporarily quarantine or rate-limit delivery to affected mailboxes; they should also train helpdesk staff to recognize that a user reporting sudden inbox flooding may be mid-attack rather than experiencing a benign spam incident [1][8].

Microsoft Defender for Office 365 Plan 2 includes Collaboration Security for Microsoft Teams, which became generally available in 2025 and provides Safe Links scanning, Safe Attachments inspection, and real-time URL detonation for content delivered through Teams [3][12]. Organizations that have licensed this capability but not enabled Teams-specific policies within the Defender for Office 365 portal should do so. Critically, these protections are enforced by the organization’s own tenant policies only when the user is operating within the organization’s tenant context; the structural guest-tenant gap remains, and organizations should not assume Defender coverage is complete for all external Teams interactions [4].

Attack simulation training within Microsoft Defender for Office 365 now includes Teams-specific phishing simulations. Organizations should incorporate Teams-based social engineering scenarios into security awareness programs rather than limiting simulations to email-delivered lures [3]. Users who have been trained to be skeptical of email attachments but have not been exposed to Teams-based impersonation scenarios represent an untested and potentially exploitable gap in organizational security culture.

Strategic Considerations

The structural security gap created by resource-tenant enforcement of Defender policies in cross-tenant contexts represents an architectural limitation that individual organizations cannot fully resolve through defensive investment alone; it requires either a platform-level change by Microsoft or a policy decision to prohibit Teams interactions with unvetted external tenants entirely. Organizations should engage their Microsoft account teams to understand Microsoft’s roadmap for addressing this limitation and should factor it into their risk acceptance posture for external collaboration scenarios.

The broader pattern—multiple financially motivated and state-linked threat actor clusters converging on Teams as a high-trust, low-friction phishing delivery channel—reflects a threat environment in which any high-adoption enterprise platform that maintains an external communication interface will eventually become a significant attack vector. Organizations should apply the same defensive scrutiny to collaboration platforms (Teams, Slack, Zoom, Webex) that they have applied to email: centralized logging, policy-based external communication controls, user-level anomaly detection, and security awareness training that addresses the specific social engineering patterns documented for each platform.

The post-Black Basta threat actor environment is characterized by distributed successor clusters that share methodology and tooling while operating with increased operational security awareness. The A0Backdoor campaign’s shift from high-visibility ransomware payloads toward persistent, low-observable access suggests that at least some of these successor clusters are pursuing longer-term intelligence and exfiltration objectives in addition to or instead of immediate ransomware monetization. Incident response planning and threat hunting programs should account for this possibility: a Quick Assist social engineering event that does not culminate in obvious ransomware should not be assumed to be low-impact or unsuccessful.


CSA Resource Alignment

This research note connects to multiple Cloud Security Alliance frameworks and publications relevant to collaboration platform security and social engineering threat management.

The CSA Cloud Controls Matrix (CCM) addresses identity and access management controls under domain IAM, including requirements for access control policies, privileged access management, and user access reviews. The Quick Assist abuse pattern exploits gaps in privileged remote access governance: IAM-09 (User Access Provisioning) and IAM-10 (User Access Reviews) are applicable to the management of remote support tool permissions. The cross-tenant guest access vulnerability maps to IAM-12 (Segregation of Duties) and IAM-15 (Privileged Access Management) requirements that should be extended to collaboration platform external access configurations.

The CSA MAESTRO framework for agentic AI threat modeling is relevant to the threat actor’s use of automation at scale in the email bombing precursor stage. While A0Backdoor itself is not an AI-enabled tool, the industrialization of the email flooding infrastructure—which requires programmatic subscription of target addresses across large numbers of services—reflects the use of automated tooling to generate the social context that makes human manipulation possible. MAESTRO’s threat modeling for AI-assisted social engineering and automated influence operations applies to this precursor methodology.

The CSA Zero Trust Guidance publication is directly applicable to both the Quick Assist abuse vector and the cross-tenant Defender protection gap. Zero Trust principles reject the implicit trust that users and systems extend to tools and channels simply because they appear to originate from trusted sources—Microsoft-signed tools, internal helpdesk contacts, or Defender-monitored environments. Applying Zero Trust to remote support workflows (requiring verification through multiple channels before granting remote access) and to external collaboration (treating all external tenant interactions as untrusted regardless of branding or apparent familiarity) directly addresses the attack surface the A0Backdoor campaign exploits.

The CSA Security-as-a-Service (SecaaS) Category 4: Email Security guidance, while focused on email, documents the defense-in-depth principles—filtering, encryption, authentication, and monitoring—that organizations should extend to collaboration platform communications as part of a comprehensive messaging security strategy. The threat actor’s deliberate choice to use Teams as an alternative to email precisely because email defenses are more mature underscores the importance of applying equivalent controls across all enterprise communication channels.

The CSA AI Organizational Responsibilities framework is relevant to the growing use of AI-assisted detection in both the offensive and defensive dimensions of this threat: Microsoft’s October 2025 disruption report noted that XDR capabilities, which increasingly incorporate AI-driven behavioral analysis, were used to identify and suspend attacker-controlled accounts and tenants at scale. Organizations evaluating AI-assisted security tooling should assess whether vendor offerings address collaboration platform threat vectors with comparable depth to email-focused capabilities.


References

[1] BlueVoyant, “New A0Backdoor Linked to Teams Impersonation and Quick Assist Social Engineering,” BlueVoyant Blog, August 2025. https://www.bluevoyant.com/blog/new-a0backdoor-linked-to-teams-impersonation-and-quick-assist-social-engineering

[2] Microsoft Threat Intelligence, “Threat actors misusing Quick Assist in social engineering attacks leading to ransomware,” Microsoft Security Blog, May 15, 2024. https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/

[3] Microsoft Threat Intelligence, “Disrupting threats targeting Microsoft Teams,” Microsoft Security Blog, October 7, 2025. https://www.microsoft.com/en-us/security/blog/2025/10/07/disrupting-threats-targeting-microsoft-teams/

[4] The Hacker News, “MS Teams Guest Access Can Remove Defender Protection,” November 2025. https://thehackernews.com/2025/11/ms-teams-guest-access-can-remove.html

[5] Check Point Research, “Microsoft Teams Impersonation and Spoofing Vulnerabilities Exposed,” November 2025. https://research.checkpoint.com/2025/microsoft-teams-impersonation-and-spoofing-vulnerabilities-exposed/

[6] Microsoft Threat Intelligence, “Malware distributor Storm-0324 facilitates ransomware access,” Microsoft Security Blog, September 12, 2023. https://www.microsoft.com/en-us/security/blog/2023/09/12/malware-distributor-storm-0324-facilitates-ransomware-access/

[7] Microsoft, “Microsoft Teams security guide,” Microsoft Learn, accessed March 2026. https://learn.microsoft.com/en-us/microsoftteams/teams-security-guide

[8] Sophos MDR, “Sophos MDR tracks two ransomware campaigns using email bombing, Microsoft Teams vishing,” Sophos News, January 21, 2025. https://www.sophos.com/en-us/blog/sophos-mdr-tracks-two-ransomware-campaigns-using-email-bombing-microsoft-teams-vishing/

[9] ThreatIntelReport, “Black Basta Threat Actor Profile,” February 24, 2026. https://www.threatintelreport.com/2026/02/24/threat_actor_profiles/black-basta-threat-actor-profile/

[10] Microsoft Threat Intelligence, “Storm-2372 conducts device code phishing campaign,” Microsoft Security Blog, February 13, 2025. https://www.microsoft.com/en-us/security/blog/2025/02/13/storm-2372-conducts-device-code-phishing-campaign/

[11] BleepingComputer, “Microsoft Teams phishing targets employees with A0Backdoor malware,” BleepingComputer, 2025. https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/

[12] Microsoft Community Hub, “General Availability for Collaboration Security for Microsoft Teams,” Microsoft Defender for Office 365 Blog, 2025. https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/general-availability-for-collaboration-security-for-microsoft-teams/4393040

[13] MITRE ATT&CK, “Storm-1811 (G1046),” MITRE ATT&CK Enterprise, accessed March 2026. https://attack.mitre.org/groups/G1046/

[14] Red Canary, “Storm-1811 exploits RMM tools to drop Black Basta ransomware,” Red Canary Blog, 2024. https://redcanary.com/blog/threat-intelligence/storm-1811-black-basta/

← Back to Research Index