Cybercriminals are constantly evolving their tactics, and a new email bombing campaign is targeting unsuspecting users with a sophisticated social engineering attack. This method overwhelms victims with spam emails before attempting to gain remote access to their devices through Microsoft Teams.

How the Email Bombing Attack Works
This attack unfolds in multiple stages:
Mass Email Spam:
Victims receive a flood of spam emails in a short period, making it difficult to spot legitimate messages. This is an attempt to create panic and confusion.
Fake Microsoft Teams Support Message:
Attackers, using Microsoft Office 365 tenants they control, send a message through Microsoft Teams. They impersonate tech support from the victim's organisation, offering to assist with the email issue.
Request for a Call and Remote Access:
The hacker convinces the victim to join a call, claiming they can resolve the issue. They use Microsoft Quick Assist or Teams screen sharing to gain control of the victim’s computer.
Deployment of Malicious Payloads:
Once access is granted, attackers can:
Download malware or ransomware
Steal credentials
Perform reconnaissance
Exfiltrate sensitive data
Maintain persistent access for future exploitation
How to Protect Yourself
Be cautious of unexpected spam floods – If you suddenly receive hundreds of emails, do not panic. This could be a diversion.
Verify all tech support requests – If someone claims to be from IT support, confirm their identity through official channels.
Never grant remote access unless verified – Microsoft Quick Assist and Teams screen sharing can be powerful tools, but they should only be used with trusted individuals.
Check Microsoft Teams permissions – Organisations should configure settings to restrict external users from initiating chats with internal employees.
How IT Desk Protects You
At IT Desk, we do not use Microsoft Teams or Quick Assist for remote access purposes. Our official communication channels are:
📞 01709 470073
📧 Emails ending in @itdeskuk.com
If you receive suspicious messages or unexpected tech support requests, contact us immediately to verify their authenticity.
Stay Secure – Think Before You Click!
By staying informed and vigilant, you can protect yourself and your business from evolving cyber threats. If you have concerns about your organisation's cybersecurity, get in touch with IT Desk for expert guidance and support.
Comments