A first-hand account from inside the SOC — the attack chain, the evasion tricks that nearly worked, and every defensive measure that stopped them.
Press enter or click to view image in full size
I’m a SOC analyst. I spend my days watching for exactly this kind of attack. And yet, the speed, the polish, and the technical creativity of this campaign genuinely impressed me — even as we were working to stop it. I’m writing this because the details matter, and because most write-ups about this attack chain are from journalists, not from people who actually saw it happen.
This is what it looks like from inside the SOC.
Press enter or click to view image in full size
Press enter or click to view image in full size
The attack didn’t start with a suspicious link or a malicious attachment. It started by making one of our users miserable.
The attack didn’t start with a suspicious link or a malicious attachment. It started by making one of our users miserable.
Within the space of about 20 minutes, an approximate number, e.g., “hundreds of” emails hit the target’s inbox. Newsletter signups. Forum confirmation emails. Travel alerts. All legitimate emails all triggered by mass-submitting the victim’s address to real websites. This is called an email bombing attack, and its purpose isn’t to deliver malware. It’s to create chaos and a sense of urgency.
The victim’s inbox was effectively unusable. Their attention was scattered. And then — right on cue — “IT support” arrived to help.”
Press enter or click to view image in full size
This is the part that makes this attack genuinely dangerous: the attackers didn’t send a phishing email. They called on Microsoft Teams.
Because so many organizations now use Teams for internal communication — including IT helpdesk tickets — a Teams message from someone claiming to be from IT support feels completely normal. The attacker’s profile was crafted to look like an internal helpdesk employee. The message was professional, empathetic, and timed perfectly: “Hi, we’ve noticed you’re experiencing an email issue. I can help fix this right now if you have a few minutes.”
The victim, frustrated and confused by hundreds of junk emails, was relieved to hear from IT. This is textbook social engineering — create the problem, then offer the solution.
“The attacker didn’t need to exploit a single vulnerability. They exploited trust.”
Press enter or click to view image in full size
Once the victim trusted the “IT” contact, the attacker asked them to open Windows Quick Assist — a legitimate, built-in Microsoft remote desktop tool. This is the critical moment. Quick Assist requires the user to share a 6-digit code with the other party, who can then take full screen control.
There’s no malware involved in this step. No exploits. Windows is working exactly as designed. The attacker now had full visual access to the victim’s desktop and could operate the mouse and keyboard remotely.
Press enter or click to view image in full size
Press enter or click to view image in full size
With remote access established, the attacker downloaded a malicious installer package disguised as a Microsoft Teams or Windows Phone Link update. The file was hosted on a personal Microsoft OneDrive account and signed with a valid digital certificate — meaning Windows’s built-in warnings were minimal.
The installer used a technique called DLL sideloading:
hostfxr.dllhostfxr.dll was the actual loader — now running in the context of a trusted processPress enter or click to view image in full size
This is where it gets genuinely sophisticated. The loader that hostfxr.dll dropped is a new piece of malware called the A0Backdoor — and its evasion techniques are worth studying in detail.
The malicious code only decrypts itself if it executes within a specific 55-hour time window after delivery. The decryption key is derived from a time-based formula — run it outside that window, and you get garbage. This means:
Even more unusual: the malware requires a specific invisible Unicode space character appended to a command-line argument to generate the correct decryption key. If you copy the command line from logs and replay it without that invisible character, the key is wrong and the malware produces nothing.
Join Medium for free to get updates from this writer.
This is a deliberate forensic countermeasure. It makes incident replay nearly impossible unless the analyst captures the exact original execution context.
Before doing anything, the loader checks the system’s firmware (via WMI queries) for strings associated with virtualized environments — QEMU, VirtualBox, VMware. If it detects a sandbox, it exits silently. It also spawns dozens of junk threads explicitly designed to crash or destabilize debuggers attached to the process.
Press enter or click to view image in full size
Once deployed, the A0Backdoor avoids direct C2 connections. Instead, it communicates using DNS tunneling — hiding data inside what looks like normal DNS lookup traffic:
1.1.1.1 (Cloudflare) and 8.8.8.8 (Google)Press enter or click to view image in full size
Our first actionable alert came from EDR when quickassist.exe spawned unexpectedly.
The cursor started moving on its own. That’s when the user called us — and that’s when we knew exactly what we were dealing with.
Based on this incident, here are the controls that would have blocked or significantly slowed this attack at each stage:
Press enter or click to view image in full size
Press enter or click to view image in full size