Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Quick, You Need Assistance!

0
Medium
Published: Mon Feb 02 2026 (02/02/2026, 10:52:24 UTC)
Source: AlienVault OTX General

Description

A Microsoft Teams voice-phishing campaign leveraging Quick Assist, a remote administration tool, was tracked in September 2025. The campaign uses help desk scams to gain initial access, followed by user group enumeration and the execution of a PowerShell script to download a command and control payload. The attack employs AMSI bypass, encrypted communications, and a web-socket remote access trojan. Multiple Microsoft 365 tenants with IT-related subdomains were used, along with various IPs and domains for C2 infrastructure. The campaign shows similarities to Storm-1811 and PhantomCaptcha activities, suggesting a complex cybercrime ecosystem. The attackers' ultimate goal may be ransomware deployment, although observed attempts were successfully blocked.

AI-Powered Analysis

AILast updated: 02/02/2026, 11:16:01 UTC

Technical Analysis

The 'Quick, You Need Assistance!' campaign is a sophisticated voice-phishing attack leveraging Microsoft Teams to socially engineer targets into initiating remote sessions via Quick Assist, a legitimate Microsoft remote administration tool. The attackers impersonate help desk personnel to gain initial access, exploiting user trust to bypass technical barriers. Once access is granted, they perform user group enumeration to map the environment and execute PowerShell scripts that download and deploy a command and control (C2) payload. The payload includes a web-socket based remote access trojan (RAT), enabling persistent, encrypted communications with the attackers' infrastructure. To evade detection, the campaign uses AMSI (Antimalware Scan Interface) bypass techniques, which allow malicious PowerShell scripts to run without triggering endpoint protection alerts. The attackers operate multiple Microsoft 365 tenants with IT-related subdomains to lend legitimacy and diversify attack vectors, alongside a broad range of IP addresses and domains for their C2 servers. The campaign shares tactics and infrastructure similarities with known cybercrime groups Storm-1811 and PhantomCaptcha, suggesting it is part of a larger, complex cybercrime ecosystem. While ransomware deployment is suspected as the final objective, no successful ransomware infections have been observed, indicating effective defensive measures so far. Indicators of compromise include specific IP addresses and domains linked to the campaign, as well as URLs hosting malicious PDF files used as decoys or additional payload delivery mechanisms. The attack chain relies heavily on social engineering, PowerShell scripting, and abuse of legitimate remote assistance tools, highlighting the need for combined technical and user-focused defenses.

Potential Impact

For European organizations, this campaign poses significant risks especially to IT departments and help desk personnel who are targeted via voice-phishing on Microsoft Teams. Successful exploitation can lead to unauthorized remote access, enabling attackers to move laterally, harvest credentials, and deploy ransomware or other malware. The use of legitimate tools like Quick Assist complicates detection and response, increasing the risk of prolonged undetected intrusions. Confidentiality is at risk due to potential data exfiltration via the RAT. Integrity and availability could be severely impacted if ransomware is deployed, disrupting business operations and causing financial and reputational damage. The campaign’s use of multiple Microsoft 365 tenants and IT-related subdomains increases the likelihood of targeting organizations heavily reliant on Microsoft cloud services, common across Europe. The encrypted communications and AMSI bypass techniques reduce the effectiveness of traditional endpoint detection solutions, requiring advanced monitoring capabilities. Although no ransomware infections have been confirmed, the potential for escalation remains high, especially in sectors with critical infrastructure or sensitive data. The campaign’s social engineering vector also highlights the human factor as a critical vulnerability. Overall, European organizations face a medium to high operational risk from this threat, particularly those with extensive Microsoft Teams and Quick Assist usage.

Mitigation Recommendations

1. Conduct targeted security awareness training focusing on voice-phishing and social engineering tactics, especially for IT and help desk staff. 2. Implement strict policies and controls around the use of Quick Assist and other remote assistance tools, including requiring multi-factor authentication and session logging. 3. Monitor PowerShell execution with enhanced logging and restrict the use of unsigned or obfuscated scripts. 4. Deploy endpoint detection and response (EDR) solutions capable of detecting AMSI bypass attempts and anomalous PowerShell behavior. 5. Use network monitoring to identify unusual encrypted web-socket traffic and connections to known malicious IPs/domains associated with this campaign. 6. Enforce conditional access policies in Microsoft 365 to limit access from suspicious tenants or subdomains. 7. Regularly review and audit Microsoft 365 tenant configurations and permissions to detect unauthorized changes or suspicious activity. 8. Maintain updated threat intelligence feeds and integrate IoCs from this campaign into security tools for proactive detection. 9. Prepare and test incident response plans specifically addressing remote access abuse and ransomware scenarios. 10. Encourage reporting of suspicious Teams calls or requests for remote assistance to security teams for rapid investigation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://fieldeffect.com/blog/quick-you-need-assistance"]
Adversary
null
Pulse Id
698081e8c82411d000808025
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip149.154.158.86
ip164.173.252.162
ip162.252.172.102
ip162.252.172.16
ip162.252.172.21
ip162.252.172.245
ip162.252.172.74
ip162.252.172.83
ip162.252.173.45
ip162.252.174.119
ip165.172.252.162

Domain

ValueDescriptionCopy
domainaeobionix.com
domainaerobionix.com
domainflyskyenterprise.com
domainibizers.com
domainj4jobspk.com
domainkhanvas.com
domainmaxolutions243.com
domainmdbelaluddin.com
domainprosearium.net

Url

ValueDescriptionCopy
urlhttps://aerobionix.com/generation.pdf
urlhttps://prosearium.net/setting.pdf

Threat ID: 698083b8f9fa50a62f37054c

Added to database: 2/2/2026, 11:00:08 AM

Last enriched: 2/2/2026, 11:16:01 AM

Last updated: 2/7/2026, 3:11:36 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats