Cybercriminals use Teams chats, help desk tricks for data theft

A threat group uses Microsoft Teams chat invites and help desk impersonation to deploy custom malware for data theft, per Google's Threat Intelligence.

Cybercriminals use Teams chats, help desk tricks for data theft

Image: theregister.com

Google's Threat Intelligence group has identified a previously unknown cybercriminal operation that combines social engineering with custom malware to steal data. The group, tracked as UNC4999, initiates attacks by sending Microsoft Teams chat invitations that impersonate help desk staff, tricking employees into granting remote access.

Once access is obtained, the attackers deploy a custom backdoor called 'VaporRage' that allows persistent data exfiltration. The malware is designed to evade detection by using encrypted communications and mimicking legitimate network traffic, according to Google's analysis published on April 24, 2026.

The campaign has primarily targeted technology and financial services companies in North America and Europe since early 2026. Google recommends organizations enable multi-factor authentication and train employees to verify help desk requests through separate channels.

❓ Frequently Asked Questions

What is UNC4999?

UNC4999 is a previously unknown cybercriminal group tracked by Google Threat Intelligence that uses social engineering and custom malware for data theft.

How does the attack work?

Attackers send Microsoft Teams chat invitations impersonating help desk staff to trick employees into granting remote access, then deploy the VaporRage backdoor malware.

Which industries are targeted?

The campaign primarily targets technology and financial services companies in North America and Europe.

📰 Source:
theregister.com →
Share: