Skip to content

Instantly share code, notes, and snippets.

@rj-chap
Last active April 22, 2026 15:53
Show Gist options
  • Select an option

  • Save rj-chap/7e6aa134804e73bc02b8cfc1d64ee811 to your computer and use it in GitHub Desktop.

Select an option

Save rj-chap/7e6aa134804e73bc02b8cfc1d64ee811 to your computer and use it in GitHub Desktop.
MS Teams Vishing Tips and Tricks

This document serves to provide resources to help Prevent, Detect, and Respond to MS Teams-based Initial Access, with a heavy focus on MS Teams > RMM/QuickAssist attacks.

Teams

Restricting 3rd Party Access

General Prevention Tips

Microsoft Reporting and Logging

Detection Baselines

  • Temporal correlation: MS Teams > QA/RMM install/execution
    • Can you correlate these activities?
    • Does your E/XDR have window titles? Can you look for help|support|desk|team types window titles?
  • External > Internal MS Teams calls
    • Window titles often note "(EXTERNAL)" for external Teams-based comms
    • Chat titles may contain a unicode character such as a checkmark (✓) to make the chat seem more official
  • QuickAssist processes
    • QuickAssist as parent process (quickassist.exe)

Detection Rules

Anywho, some rules!

RMM Resources

Useful RMM Links

The following are the RMM-focused shortened links curently covered in FOR528. Our focus here is on MS Teams-based vishing that leads to RMM installation via social engineering. You can use the following resources to identify RMM tool names along with their process names, domain(s), and more for the purposes of blocking (prevention) and/or alerting (detection).

  • for528.com/rmm -- splunk / security_content > remote_access_software.csv
    • Contains RMM names along with domain, process names, signer info, and commentary for reference
  • for528.com/rmm2 -- svch0stz / velociraptor-detections - SuspiciousSoftware.csv
    • Includes RMM tool names along with process name regex patterns + references
  • for528.com/rmm3 -- Trend Micro's "Analysis on legit tools abused in human operated ransomware" PDF
    • 180+ pages covering a bevy of RMM tools and includes low level forensic analysis tips and tricks. SUPER useful if you run into one of the RMMs noted in this doc!
  • for528.com/rmm4 -- 0x706972686f / RMM-Catalogue - rmm.csv
    • RMM names w/ domains & process names
  • for528.com/rmm5 -- brokensound77/RMM-detection.md
    • Detailed detection/hunting methodology along with plentiful process names, domains, and other metadata associated with top RMM tools
  • for528.com/rmm6 -- redcanaryco / surveyor - remote-admin.json
    • JSON file with RMM names along with process names, domains, and signer names.

RMM Blocking Tips

Do you have an APPROVED list? Great! Block everything else!

  1. NGFW -- Approve / block lists
    • Start by approve listing the RMMs approved for use in your org
    • Next, block RMMs or remote access tools just below your approvals using your NGFW's appropriate category name
  2. NGFW -- Block domains per RMM
    • See provided shortened links below for associated domain names
  3. E/XDR -- Block by process name/signer name
    • See below for details

Rather than just blocking the process name(s) associated with a given RMM, I recommend blocking by the OriginalFileName from the VERSIONINFO resource along with certificate signer name via your E/XDR, if you are able to do so.

  • Example: Blocking Ninja RMM
    • Block process name: "?:\\*NinjaRMMAgent*.exe"
    • ALSO block OriginalFileName: NinjaRMMAgent
    • ALSO block signer name: NinjaRMM, LLC
      • NOTE: Blocking via signer name can be extremely useful, including helping blocking re-named RMM agents. However, since RMM developers may also provide non-RMM tools, you may cast a side net and start blocking non RMM tooling at first, requiring baselining/exceptions to hit maximum efficiency
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment