This crafty ransomware campaign has Microsoft Teams users in its crosshairs

Microsoft Teams
(Image credit: Shutterstock / Ink Drop)

Cybercriminals have begun using malicious fake ads for Microsoft Teams updates to deploy backdoors that use the Cobalt Strike attack-simulation tool to infect corporate networks with malware and ransomware.

So far these attacks have targeted organizations across a variety of industries but recent campaigns have focused on the education sector which relies on Microsoft Teams and other video conferencing software for distance learning.

As reported by BleepingComputer, Microsoft has released a non-public security advisory warning its customers about these so called “FakeUpdates” campaigns which were first seen delivering the DoppelPaymer ransomware last year.

Now though, these campaigns have evolved by using signed binaries and various second-stage payloads including the WastedLocker ransomware. The attackers responsible have also started exploiting the ZeroLogon vulnerability in the Netlogon protocol.

FakeUpdates

In order to plant their fake ads successfully, the cybercriminals used malicious online advertisements and also abused search engine results. According to Microsoft, in one attack those responsible purchased a search engine ad that caused the top results for Teams to point to a domain under their control.

Clicking on a link on this page downloaded a payload which executed a PowerShell script to retrieve even more malicious content but doing so also installed a legitimate copy of Microsoft Teams on a user's system to prevent them from suspecting foul play.

In its non-public security advisory, Microsoft also said that the initial payload in many cases was the Predator the Thief infostealer which is used to steal and send sensitive information such as credentials and browser and payment data back to the attackers. The malware was also used to download Cobalt Strike beacons that allow an attacker to discover how they could move laterally across an organization's network.

Microsoft Teams isn't the only software being used as a lure by these FakeUpdates campaigns as Microsoft observed similar attacks leveraging at least six other software products to deliver malware.

To prevent falling victim to a FakeUpdate attack, the software giant recommends that organizations use web browsers capable of filtering and blocking malicious websites and ensure their local administrators are using strong passwords. Additionally, limiting admin privileges to essential users can prevent attackers from easily moving laterally across a network.

Via BleepingComputer

Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Security
Woman shocked by online scam, holding her credit card outside
Cybercriminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
HTTPS in a browser address bar
Malicious "polymorphic" Chrome extensions can mimic other tools to trick victims
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
Latest in News
Apple iPhone 16 Review
Three iPhone 17 model dummy units appear in a hands-on video leak
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
New Samsung Galaxy S25 Edge may have revealed some key details – including its price
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 9 (game #1140)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 9 (game #371)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 9 (game #637)
WhatsApp
WhatsApp just made its AI impossible to avoid – but at least you can turn it off