Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Lorem Ipsum Malware: Trojanized MS Teams Installers

0
Medium
Published: Mon May 04 2026 (05/04/2026, 23:46:53 UTC)
Source: AlienVault OTX General

Description

A threat group is distributing trojanized Microsoft Teams installers via a global SEO-poisoning campaign. These installers deploy a multi-stage shellcode loader and backdoor called Lorem Ipsum. The campaign has been active since February 2026 and targets users searching for Microsoft Teams in six countries, including confirmed targeting of a US healthcare organization. The malware uses sophisticated techniques such as substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and disguises command-and-control traffic as JFIF images. It abuses a legitimate India-based platform (letsdiskuss. com) as a dead-drop resolver for its C2 infrastructure. Attackers use validly signed MSI installers with short-lived Microsoft ID Verified certificates and rapidly weaponized infrastructure. The development speed suggests possible use of advanced tooling, indicating a well-funded mid-tier criminal actor.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/05/2026, 10:36:22 UTC

Technical Analysis

The Lorem Ipsum malware campaign involves distributing trojanized Microsoft Teams MSI installers through SEO poisoning. These installers are signed with valid Microsoft ID Verified certificates valid for three days, enhancing their credibility. The malware employs a multi-stage loader architecture with techniques including substitution cipher decoding, XOR encryption of shellcode, DLL sideloading, and command-and-control traffic disguised as JFIF images. The campaign abuses letsdiskuss.com, a legitimate India-based platform, as a dead-drop resolver for C2 communications. Infrastructure is rapidly deployed using NameCheap-registered domains, and callbacks are tracked per victim using UUIDs. The campaign targets multiple countries and has confirmed impact on a US healthcare organization. The rapid evolution and complexity suggest a well-resourced mid-tier criminal actor, possibly leveraging LLM-assisted tooling for development.

Potential Impact

The malware enables attackers to deploy a backdoor on victim systems via trojanized Microsoft Teams installers, potentially compromising confidentiality, integrity, and availability of affected systems. The use of valid code signing certificates and sophisticated evasion techniques increases the likelihood of successful infection. Targeting includes at least one US healthcare organization, indicating potential impact on sensitive sectors. The multi-stage loader and encrypted communications complicate detection and analysis. No known exploits in the wild are reported yet, but the campaign is active and evolving.

Mitigation Recommendations

No official patch or remediation is available as this is a malware campaign rather than a software vulnerability. Defenders should avoid downloading Microsoft Teams installers from unofficial or suspicious domains such as official-teams-storage.com. Verify installer signatures and source authenticity directly from Microsoft. Monitor for indicators of compromise including the listed domains and file hashes. Since the campaign abuses valid Microsoft code signing certificates, rely on multiple verification factors beyond signature presence. Incident response should focus on detection and removal of the Lorem Ipsum backdoor if infection is suspected. Patch status is not applicable; check vendor advisories for updates on legitimate Microsoft Teams installers.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.bluevoyant.com/blog/lorem-ipsum-trojanized-microsoft-teams-installers-multi-stage-loader-backdoor"]
Adversary
null
Pulse Id
69f92fedbdf318f94db2fc63
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainofficial-teams-storage.com
domainbiblegodlike.com
domaingraburban.com
domainreeeeealy.com
domainsemigoddess.com
domainwww.letsdiskuss.com
domainvaleurban.com

Hash

ValueDescriptionCopy
hash448afbdb6752c86e627d269ea244994d2c072d5110b490232dd7834943b043cb
hash82ebca8612e203f6d8a2dcdc5e586095ebf94e5e29724ba92cd8bd090df47eb2
hashba5d73ca2c5aced43c7605e5652ba31fc63ca9b1f419ee4b934757c010c60f75
hash045b76fa552dbfdfb7e5de66c9c599fe91151384be6a9849ec8965aa7251b818

Url

ValueDescriptionCopy
urlhttps://official-teams-storage.com/files_dws_arch/MTSetup_v15.3.71194.msi
urlhttps://www.letsdiskuss.com/user/dhuahsd12d2752

Threat ID: 69f9c4e6cbff5d8610ea2fc2

Added to database: 5/5/2026, 10:22:30 AM

Last enriched: 5/5/2026, 10:36:22 AM

Last updated: 5/5/2026, 1:34:29 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses