January 30, 2025
By Cybervergent Team

Fake IT Help Desks on Microsoft Teams: Black Basta’s New Ransomware Tactic"

Phishing emails are no longer the only danger lurking in the inbox—cyber attackers have found a new way in. Meet Black Basta, a crafty ransomware group that has swapped traditional email phishing for MicrosoftTeams impersonation. Now, a friendly IT support message in your Teams chat could be more than meets the eye, hiding a carefully crafted ransomware operation disguised as internal support.

The Sneaky Strategy: How Black Basta Infiltrates Microsoft Teams

Black Basta affiliates have found a clever way to pose as corporate help desks directly within Microsoft Teams. Here’s how they’re conning employees, step-by-step:

1.    Inbox Overload: First, employees’ inboxes are flooded with spam, creating a stressful environment where they’re looking for any way to clean things up.

2.    Teams Impersonation: Black Basta uses fake Microsoft Entra ID accounts with names like "securityadminhelper.onmicrosoft.com" and cleverly padded usernames(e.g., “Help Desk”) to pose as official IT contacts.

3.    A “Helpful” Message: Black Basta sends a friendly chat message offering to fix the spam issue. They may even share QR codes linked to questionable domains, which can open up avenues for phishing or malware.

4.    Remote Access Setup: Just like their past scams, Black Basta convinces employees to install remote access tools like Any Desk or Quick Assist. Once installed, they run malicious payloads like "AntispamAccount.exe" to compromise the device fully.

5.    Ransomware Deployment: After gaining access, they spread across the network, escalating privileges until they deploy ransomware, effectively locking out employees and threatening sensitive corporate data.

Why This Attack Works So Well

Microsoft Teams is usually a trusted communication platform, especially with the rise of remote and hybrid work. Employees tend to lower their guard, not expecting threats to come from within their internal messaging systems. Black Basta has tapped into this trust, catching employees off guard when they’re already vulnerable from a spam-filled inbox.

How Companies Can Protect Themselves

The cybersecurity firm ReliaQuest, which discovered this new attack, recommends limiting Teams communication to trusted domains to keep out imposters. Here’s what companies can do to stay one step ahead:

1.    Enable Logging: Activate logging for critical events like "ChatCreated" to help trace any suspicious activity.

2.    Educate Employees: Teach employees to be cautious of messages from unfamiliar contacts, even in trusted platforms like Teams.

3.    Restrict Remote Access Tools: Limit the use of remote tools like AnyDesk or Quick Assist, especially for non-IT staff, to prevent unauthorized access.

4.    Spot Suspicious Names and Domains: Train employees to recognize unusual display names and unfamiliar domains linked to supposed Microsoft accounts.

Conclusion: A Wake-up Call for Cybersecurity

Black Basta’s shift to Microsoft Teams reveals a blind spot in corporate security strategies. This new attack underscores the importance of continuous training and stricter access controls. As cyber threats continue to evolve, so must our defenses—not only in technology but also in user awareness and internal processes. In a world where hackers are just a chat message away, the frontline of security is a vigilant, informed workforce.