Sophos MDR has observed a concerning trend: threat actors are increasingly leveraging Microsoft Teams voice calls to deliver ransomware. These sophisticated tactic, employed by groups like STAC5143 and STAC5777, highlights the evolving nature of cyber threats and the need for robust defenses. Â
How the Attack Works:
- Initial Infiltration: Sophos MDR noted that the attack often begins with a massive spam email campaign that overwhelms the victim’s inbox. Â
- Teams Impersonation: Shortly after, the targeted employee receives a Microsoft Teams voice call from an external account posing as an IT support representative. These accounts often mimic legitimate internal names, such as “Help Desk Manager,” to increase credibility. Â
- Gaining Remote Access: During the call, the attacker employs social engineering tactics to convince the victim to grant remote access to their system. This can be achieved through various methods, including convincing the employee to download a remote access tool or granting screen-sharing permissions within Teams. Â
- Ransomware Deployment: Once the attacker gains remote access, they proceed to deploy malicious payloads, such as ransomware, onto the victim’s machine.
Why is this concerning?
- Increased sophistication: This attack method demonstrates a significant increase in sophistication from traditional phishing emails.
- Exploiting trust: Attackers abuse the trusted nature of internal communication platforms like Microsoft Teams to gain access. Â
- The human element: The success of these attacks relies heavily on social engineering, exploiting human psychology to manipulate victims into granting access.

Mitigating the Threat suggested by Sophos MDR:
- Implement Robust Security Measures:
- Restrict External Access: Configure Microsoft Teams to limit external access to internal users. Â
- Employee Training: Educate employees about social engineering tactics, the importance of verifying caller identity, and the risks of granting remote access to unknown individuals. Â
- Implement Multi-Factor Authentication (MFA): Utilize MFA for all user accounts to enhance security and prevent unauthorized access.
- Review and Update Security Policies Regularly: Review and update security policies regularly to address evolving threats and ensure they are effectively implemented. Â
Conclusion:
Ransomware attacks are becoming increasingly sophisticated, and threat actors are constantly evolving their tactics. By implementing robust security measures, including the deployment of solutions like Sophos MDR, organizations can effectively mitigate the risks associated with these attacks and protect their critical data and systems. Â
Meta Techs can help you strengthen your defenses against these and other emerging cyber threats. Contact us today.







