Published April 24, 2026
Microsoft has recently warned of an increase in real‑world cyberattacks abusing Microsoft Teams external chat to impersonate IT helpdesk personnel. In these incidents, attackers pose as trusted internal support staff and persuade users to grant remote access using legitimate Microsoft tools, which can lead to data theft and full enterprise compromise if successful.
Microsoft has observed multiple intrusions where threat actors leverage the following:
- Initiate external Microsoft Teams chats with employees
- Impersonate internal IT or helpdesk personnel
- Claim to be responding to an account issue, security alert, or required update
- Convince users to launch a remote support session (commonly Microsoft Quick Assist)
- Use that access to move laterally and steal sensitive data
Because the attacker relies heavily on signed Microsoft tools and native Windows administration features, their activity can appear legitimate and bypass many traditional security alerts.
How this Attack Works
Initial Contact
The attacker sends a Microsoft Teams message from an external tenant, posing as IT support. Teams displays an “external user” banner, but urgency and social engineering are used to override caution.
Remote Access Granted
The victim is instructed to start a remote session using Microsoft Quick Assist, granting the attacker interactive control of the endpoint.
On‑System Reconnaissance
The attacker uses built‑in Windows tools (Command Prompt, PowerShell) to assess privileges, domain membership, and network access.
Stealthy Persistence & Execution
Malicious code is deployed using DLL side‑loading through trusted, signed applications (e.g., Adobe Reader, Autodesk software). Command‑and‑control traffic is sent over HTTPS, blending into normal outbound activity.
Lateral Movement & Data Theft
The attacker abuses Windows Remote Management (WinRM) to move laterally and uses tools such as Rclone to selectively exfiltrate sensitive data to external cloud storage.
Why This Threat is so Effective
These attacks are particularly effective because they use legitimate Microsoft and Windows tools, closely resembling normal IT helpdesk activity, bypass many email‑centric phishing defenses, and, in the early stages, avoid detection by traditional malware systems.
Successful attacks can result in credential exposure, data theft, regulatory impact, and operational disruption.
Organizations are at higher risk if they:
- Allow external Microsoft Teams messaging
- Permit unrestricted use of Quick Assist or other remote support tools
- Have limited monitoring around administrative tools such as WinRM
- Rely heavily on Teams for IT support communications
Common indicators of suspicious activity are:
- External Teams messages requesting remote access
- Unexpected Quick Assist sessions
- PowerShell or cmd usage post remote session
- WinRM connections between endpoints
- Large outbound HTTPS transfers to unfamiliar cloud services
Recommended Actions
Clearwater strongly recommends clients take the following actions:
Behavioral Guidance for End Users
Provide explicit instructions to your staff to mitigate social engineering risks:
- Treat external Teams messages as untrusted by default, even if they appear to originate from IT.
- Never grant remote access unless the request has been verified through an approved, out-of-band internal process.
- Report unexpected IT contact via Teams to the security or IT department immediately.
Technical Controls for IT & Security Teams
Harden related security controls to restrict attacker mobility:
Microsoft Teams Controls
Disable or restrict external Teams chat or account registration for your environment.
Endpoint Controls
Restrict or monitor Quick Assist usage.
Detection & Monitoring
Monitor Quick Assist launches
Monitor WinRM activity
Monitor Rclone or unusual outbound data transfers
Alert on external Teams messages initiating support workflows
Disable or restrict remote management tools to authorized roles
For clients who use Clearwater’s Managed Security Services, be assured our team is taking appropriate steps to protect your environment. If you have questions or would like to discuss this advisory notice, please contact us.


