Phishing Campaign via Microsoft Teams Installs A0Backdoor Malware Targeting Finance and Healthcare Sectors

Views: 79 views

139/69 Wedesday, March 11, 2026

Cybersecurity experts have identified a new malware campaign involving A0Backdoor, which specifically targets employees within global financial institutions and healthcare organizations. Attackers begin by sending large volumes of spam emails to disrupt victims. They then impersonate corporate IT staff and contact employees through Microsoft Teams, offering assistance in resolving the spam issue. Using social engineering techniques, the attackers build trust and persuade victims to launch Quick Assist, allowing them to gain remote access to the victim’s computer.

Once access is obtained, the attackers deploy malicious tools through digitally signed MSI installers to evade security checks. They employ a DLL sideloading technique, leveraging trusted Microsoft system files to load a malicious library (such as hostfxr.dll) into memory. The malware decrypts embedded shellcode and performs sandbox detection to avoid analysis. It also creates a large number of threads to disrupt debugging tools and hinder investigation before ultimately executing the main payload, A0Backdoor, which is encrypted using the AES algorithm.

A particularly concerning aspect of A0Backdoor is its covert communication with command-and-control servers through DNS traffic. Instead of using commonly monitored TXT records, the malware uses MX records-typically associated with email routing-to transmit encrypted data and receive commands, helping it evade many detection systems. Researchers from BlueVoyant believe the campaign represents a technical evolution of the ransomware group BlackBasta, adapting its tactics to avoid modern security defenses.

Source https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/