191/36 CTI Tower, 23rd Floor, New Ratchadaphisek Road, Khlong Toei, Bangkok , 10110, Thailand

How Attackers Leverage Microsoft Teams and Quick Assist for Access: Understanding BackConnect Malware and QakBot

10 March, 2025

3MinutesRead

Picture a scenario where a seemingly harmless request for technical assistance morphs into a conduit for cybercriminals to breach your security defenses. This isn’t just a figment of imagination—it’s a growing cybersecurity threat that requires immediate attention. Malicious actors are increasingly exploiting legitimate remote support tools like Microsoft Teams and Quick Assist to deliver advanced malware, such as BackConnectQakBot, and DarkGate—often tied to malicious operations like Operation Duckhunt.

This article is an essential resource for cybersecurity professionals and intermediate tech users, providing key insights to recognize how these tools are being manipulated for unauthorized access. We will explore the tactics, techniques, and procedures (TTPs) of cybercriminals, offering actionable steps to bolster your defenses against these evolving threats.

Cybercriminals Exploit Microsoft Teams and Quick Assist: A Wake-Up Call for Cybersecurity Awareness

In today’s digital world, cybersecurity threats are evolving at an unprecedented rate. Cybercriminals are constantly finding new ways to exploit trusted tools. Collaboration platforms like Microsoft Teams and remote support tools such as Quick Assist—critical for modern businesses—are now under attack. A recent report by Trend Micro highlights a sophisticated cyber-attack that uses social engineering to install BackConnect malware, allowing attackers to maintain persistent control over compromised systems while stealing sensitive data.

This article aims to raise awareness about these emerging threats and provide practical steps to safeguard against them.

The Growing Threat Landscape

Cybercriminals are increasingly exploiting the trust and familiarity associated with platforms like Microsoft Teams and Quick Assist. By using social engineering techniques—such as phishing emails or misleading messages—they deceive users into initiating sessions with attackers.

  • Microsoft Teams is exploited through compromised or fake accounts, mimicking trusted colleagues. Attackers often send routine messages with malicious links or attachments. Once users interact with these elements, malware is silently installed, enabling attackers to steal data, launch ransomware attacks, or gain full system control.
  • Quick Assist, a built-in Windows feature for remote assistance, is another tool being misused. Cybercriminals send urgent requests for technical help, tricking users into sharing connection codes. This grants attackers control over the victim’s machine, allowing them to deploy malware like BackConnect and QakBot, steal sensitive data, and manipulate system settings.

Malware in Action: BackConnect, QakBot, and DarkGate

Several types of malware are central to these attacks:

  • BackConnect (BC) Malware: A Remote Access Trojan (RAT) that grants attackers persistent, covert access to compromised systems. It initiates outbound connections to an attacker’s command-and-control (C2) server, bypassing firewall restrictions.
  • QakBot: Originally a banking trojan, QakBot has evolved into a versatile malware that steals credentials, spreads within networks, and facilitates ransomware attacks.
  • DarkGate: A modular malware known for remote access capabilities, keylogging, data exfiltration, and botnet functionality.

Real-World Examples: Operation Duckhunt and the Black Basta/Cactus Connection

Operation Duckhunt” illustrates the real-world campaigns exploiting vulnerabilities in Quick Assist and Teams. These operations involve social engineering, remote access via Quick Assist, malware deployment, lateral movement, and data exfiltration.

In addition, Trend Micro analysts have observed Black Basta and Cactus ransomware actors using BackConnect malware. Notably, Black Basta extorted $107 million from victims in 2023 alone.

Proactive Measures for Protection

To defend against these evolving threats, organizations and individuals must adopt a multi-layered security approach:

  • User Awareness and Training: Train users to recognize phishing attempts, scrutinize unsolicited requests, and report suspicious activities promptly.
  • Technical Security Measures:
    • Restrict Quick Assist usage.
    • Enforce strict access controls within Teams.
    • Implement Multi-Factor Authentication (MFA).
    • Deploy Endpoint Detection and Response (EDR) solutions.
    • Regularly patch and update systems to prevent vulnerabilities.
  • Proactive Monitoring and Incident Response:
    • Monitor the use of Quick Assist and Teams.
    • Set up security alerts for anomalous behavior.
    • Develop a specific Incident Response Plan and conduct regular security audits and penetration testing.

SafeComs: Your Partner in Cybersecurity

In the face of these evolving cyber threats, partnering with a reliable IT solutions provider is essential. SafeComs offers tailored IT solutions, including CybersecurityIT OutsourcingERP Solutions, and PDPA Compliance, to help businesses stay secure.

Contact us to learn more about safeguarding your systems and data.

This article has been crafted with the assistance of SafeComs AI Automation Bot.

About Author

Sed ut perspiciatis unde omnis iste natus err sit voluptatem accusantium dolore mo uelau dantium totam rem aperiam eaque ipsa quae ab illo inven.

top

Let’s Discuss a Project Together

Let us help you get your project started.

SafeComs – Trusted IT Security & Business Solutions
SafeComs provides comprehensive IT security, infrastructure, and business solutions to help organizations operate safely and efficiently. With decades of experience, we deliver professional consulting, managed services, and innovative technologies that empower businesses to stay protected and grow with confidence.

Contact: