business

Imposter IT on Teams Opens the Door to Enterprise Compromise

Published

on


A new campaign weaponizes trust in collaboration tools. Attackers pose as IT on Microsoft Teams, coax employees into remote access, and run PowerShell that pulls a loader exploiting CVE-2025-26633 in Microsoft Management Console. The flaw—now added to CISA’s KEV—lets a malicious .msc run when its benign twin is launched. Patch and tighten verification controls immediately.

A social-engineering wave is turning Microsoft Teams into a beachhead. Adversaries masquerade as internal help-desk staff, request remote access, and execute PowerShell that fetches a loader which plants twin .msc files. When mmc.exe opens the legitimate console, Windows loads the attacker’s EvilTwin from the MUIPath directory, handing over code execution.

“Social engineering remains one of the most effective tools… attackers impersonate IT support, gain trust and remote access, and ultimately deploy suspicious tools,” Trustwave SpiderLabs reported. Trustwave

  • Initial access via Teams impersonation. Operators send Teams requests as “IT” and guide the user into a remote session.
  • PowerShell loader. Typical first command: powershell.exe -ExecutionPolicy Bypass … Invoke-RestMethod … runner.ps1 | iex, which drops twin .msc files.
  • Exploit: CVE-2025-26633 / “MSC EvilTwin”—an MMC security-feature bypass that prioritizes a localized .msc in MUIPath (e.g., en-US) over the benign one. Patched by Microsoft in March 2025; listed by CISA KEV.
  • Payloads and tooling. Fickle Stealer for data theft; SilentCrystal (Go loader) abusing Brave Support as a dropper; SOCKS5 backdoor for C2.
  1. The lure: A user accepts a Teams contact from “IT Support.” A remote session starts.
  2. Command drop: Attacker runs a single PowerShell line (ExecutionPolicy Bypass) that downloads runner.ps1 from cjhsbam[.]com.
  3. EvilTwin setup: The script writes two identically named .msc files; the malicious copy sits in …\System32\en-US (or a mock “C:\Windows␠\System32” with a trailing space), then mmc.exe loads the malicious one first.
  4. Post-exploit: Persistence, AES-encrypted tasking over C2, and optional info-stealing via Fickle Steal
  • Trust channel abuse: Users expect help-desk on Teams; the UI looks familiar. Prior research shows Teams vishing has delivered RATs and ransomware before.
  • Living-off-the-land: PowerShell + signed Windows binaries (mmc.exe) keep telemetry subtle.
  • Path precedence edge case: The MUIPath lookup lets a malicious localized .msc hijack execution—now patched, but effective on lagging fleets.

“Treat every ‘IT support’ request in Teams as untrusted until proven otherwise. Make users verify out-of-band, and make admins verify the OS. If your estate isn’t patched for CVE-2025-26633, you’re one click away from handing attackers mmc.exe on a silver platter. Block the social angle, patch the technical angle, and hunt for ExecutionPolicy Bypass like your business depends on it—because it does.” — El Mostafa Ouchen

Immediate actions (enterprise)

1) Patch priority

  • Deploy March 2025 Windows updates that remediate CVE-2025-26633 across client and server. Validate compliance in WSUS/Intune/ConfigMgr; confirm exposure via MSRC / NVD.

2) Harden Teams trust boundaries

  • Restrict External Access to allow-list domains; disable unsolicited chats from unknown tenants.
  • Create a help-desk verification policy: no remote control unless the user initiates via the corporate portal/ticket, plus callback via a known internal number. (Microsoft and industry advisories consistently warn about tech-support impersonation.)
  • PowerShell: alert on -ExecutionPolicy Bypass, Invoke-RestMethod, DownloadString, or Invoke-Expression launched from Teams, Teams.exe child, or interactive sessions.
  • MMC/EvilTwin indicators:
    • mmc.exe loading .msc from MUIPath (…\System32\en-US*.msc) or paths with trailing spaces (e.g., C:\Windows␠\System32).
    • Unexpected writes to localized .msc directories.
    • New .msc files followed by immediate mmc.exe execution.

Sample KQL (Microsoft Defender XDR)

4) Reduce blast radius

  • Enforce ASR rules (e.g., block Office/Win32 child processes), Constrained Language Mode where feasible, and Device Control to prevent unauthorized admin tools.
  • WDAC/AppLocker: explicitly allow only known-good .msc; deny execution from localized resource folders and user-writable paths.

5) People & process

  • Run an awareness micro-module: “Never accept unsolicited remote-access on Teams. Verify via ticket + callback.”
  • Table-top a scenario: help-desk impersonation → PowerShell dropper → MMC exploit → C2.

Indicators & context

  • Domains/paths seen: cjhsbam[.]com, rivatalk[.]net, safesurf.fastdomain-uoemathhvq.workers.dev; twin .msc technique; AES-tasking over C2; SilentCrystal loader; SOCKS5 backdoor.
  • Attribution & scope: EncryptHub (aka LARVA-208 / Water Gamayun) active since 2024; >600 orgs claimed impacted in reporting.

The bigger picture

Abuse of “work-trusted” channels (Teams, Slack, Quick Assist) is now routine in ransomware and stealer operations. Recent cases show Teams vishing setting up RAT installs and “support” sessions that end in domain compromise. The platform isn’t the problem; trust without verification is.

Bottom line

This campaign fuses social engineering with a Windows path-precedence quirk. If you patch CVE-2025-26633, lock down Teams external contact, verify support out-of-band, and hunt for Bypass-heavy PowerShell, you turn a high-probability breach into a blocked pop-up.

One-Page SOC Playbook (Teams “Request Remote Access” abuse)

Detect, contain, and prevent Teams-led social engineering that results in malicious .msc execution and data theft.

1) Patch & Exposure

  • Deploy the March 2025 Windows updates addressing CVE-2025-26633 to all supported builds.
  • Verify posture via WSUS/Intune/ConfigMgr compliance reports; track exceptions with a 48-hour SLA.

2) Microsoft Teams Guardrails

  • External Access: Move to allow-list of trusted tenants; disable unsolicited chats from unknown domains.
  • Support workflow: No remote control unless initiated from the corporate portal/ticket, plus callback verification from a published internal number.
  • Education: 10-minute module: “Never accept unsolicited remote access.”

3) Detections to Enable (Microsoft Defender XDR – KQL)

A. PowerShell dropper patterns (bypass + web fetch):

B. Teams as the launchpad (PowerShell child of Teams):

C. MMC loading suspicious .msc (localized folders / path tricks):

D. Unexpected .msc file writes (resource folders):

4) Containment & Hardening

  • Isolate device in EDR if any rule above fires + user confirms unsolicited “IT” contact.
  • Revoke tokens (AAD sign-ins, OAuth grants) and reset credentials from a known-clean host.
  • ASR rules: Block abuse of LOLBins (Office child processes, script abuse); audit → enforce.
  • WDAC/AppLocker: Allowlist known-good .msc; deny execution from localized resource folders and user-writable paths.
  • PowerShell CLM where feasible; log Script Block/Module events to SIEM.

5) Comms & Aftercare

  • Notify impacted users; provide a one-page “verify IT requests” reminder.
  • Run retro hunt for the past 30–60 days with the KQL above; export findings for IR.
  • Add the scenario to quarterly table-top: Teams impersonation → remote session → PowerShell → MMC hijack.

KPIs: Patch compliance ≥98% within 72h; zero unsolicited remote-access approvals; MDE detections triaged <1h; mean-time-to-isolation <15m.

Sources:

  • CyberSecurityNews: Teams impersonation + remote access flow and runner.ps1 details. Cyber Security News
  • Trustwave SpiderLabs: technical breakdown (EvilTwin, MUIPath precedence, SilentCrystal, IOCs). Trustwave
  • Trend Micro: CVE-2025-26633 “MSC EvilTwin” analysis and Water Gamayun/EncryptHub link. Trend Micro
  • NVD/MSRC: CVE-2025-26633 description and references. NVDMicrosoft Security Response Center
  • CISA: KEV listing/alert for CVE-2025-26633. CISA
  • Fortinet: Fickle Stealer capabilities/background. Fortinet

Trending

Exit mobile version