Threat actors in 2026 are refining their tactics by 'living off the trusted platform,' a strategy that involves abusing legitimate, well-known services to carry out attacks. Instead of relying on their own custom infrastructure, which can be easily identified and blocked, attackers are co-opting services like Microsoft Teams, GitHub, and the Windows Phone Link application. This approach makes their malicious activity extremely difficult to detect, as it is hidden within the vast streams of legitimate traffic associated with these trusted platforms. The trend includes using Teams for malware delivery, GitHub for hosting malicious code, and Phone Link for bypassing multi-factor authentication, demonstrating a strategic move to exploit implicit trust and bypass traditional security controls.
The 'living off the trusted platform' strategy is a sophisticated evolution of the 'living off the land' technique. Instead of just using native OS tools, attackers are now using globally trusted cloud services.
Malware Delivery via Microsoft Teams: Attackers are using compromised accounts or social engineering to send malicious files and links through Teams chat. Because Teams is a primary internal communication tool, users are more likely to trust and open files received through it. This bypasses email gateways, the traditional chokepoint for malware scanning.
Malware Distribution via GitHub: GitHub is being used to host malware, C2 configurations, and as a distribution point for compromised software installers. Attackers create public or private repositories that appear legitimate, using them as a stable and reputable source for downloading malicious payloads.
MFA Bypass via Windows Phone Link: Financially motivated cybercrime groups are exploiting the Windows Phone Link application. This tool syncs a user's phone with their Windows PC, including SMS messages. If an attacker has compromised the user's PC, they can use Phone Link to intercept one-time passcodes (OTPs) sent via SMS for multi-factor authentication, allowing them to take over online accounts.
C2 via Blockchain: Some actors are using transactions on public blockchains for command-and-control (C2) communications. They can embed commands or exfiltrated data into transaction metadata, creating a highly resilient and difficult-to-block C2 channel.
The effectiveness of this strategy lies in its ability to blend in. Security tools are typically configured to trust traffic to and from major platforms like Microsoft, Google, and GitHub.
T1219 - Remote Access Software: The abuse of legitimate platforms like Teams and Phone Link falls under this category.T1102 - Web Service: Using platforms like GitHub for C2 or data exfiltration.T1566.002 - Phishing: Spearphishing Link: Delivering malicious links via Teams chat.T1114.001 - Email Collection: Local Email Collection: The principle of intercepting messages is similar to how Phone Link abuse works for SMS.The primary impact of this trend is the degradation of existing security controls. Security tools that rely on blacklisting bad IPs or domains are rendered ineffective when the malicious activity is hosted on microsoft.com or github.com. This forces a paradigm shift for defenders, from blocking known-bad to identifying anomalous behavior within known-good platforms. Successful attacks can lead to malware infection, data breaches, financial fraud, and account takeover, all while being much harder to detect and trace.
No specific Indicators of Compromise were provided in the source articles, as this trend focuses on abusing legitimate infrastructure.
.zip archives from non-official or newly created repositories, especially from non-developer workstations.Detection:
Response:
Migrate from SMS-based MFA to phishing-resistant alternatives like FIDO2 to defeat interception attacks via tools like Phone Link.
Ingest and analyze audit logs from trusted platforms (M365, GitHub) to detect anomalous behavior within legitimate traffic streams.
Educate users that legitimate platforms can be abused and to be cautious of unexpected requests or files, even from known contacts.
While broad blocking is not feasible, use proxies to inspect traffic to these platforms and block downloads of high-risk file types from untrusted sources.
The abuse of Windows Phone Link to intercept SMS-based OTPs is a textbook case for why organizations must adopt phishing-resistant Multi-factor Authentication. This technique directly counters the threat by moving away from interceptable factors. Instead of SMS, companies should enforce the use of FIDO2/WebAuthn security keys or authenticator apps that use push notifications with number matching. These methods are not vulnerable to simple interception on a compromised endpoint. A FIDO2 key requires physical presence, and a number matching push notification requires the user to actively confirm the login on their trusted device. By making this transition, organizations can completely neutralize the threat of SMS interception for account takeover.
To detect the abuse of platforms like Teams and GitHub, Web Session Activity Analysis is essential. This involves moving beyond network-level indicators and analyzing application-level logs. Security teams must ingest audit logs from Microsoft 365 and GitHub into their SIEM. Then, they can build detection rules for anomalous behavior. For example, a rule could flag a user who has never shared a file in Teams before suddenly sending an executable to 50 people. Another rule could detect a non-developer workstation downloading a .zip file from a GitHub releases page. This focus on application-layer behavior within trusted services is the only reliable way to spot malicious activity that is otherwise hidden in legitimate traffic.
While attackers are using trusted platforms for ingress, Outbound Traffic Filtering remains a key control for detecting C2 and exfiltration. For the abuse of GitHub, organizations can use sophisticated web proxies to apply more granular policies. For example, a policy could allow developers to browse github.com and clone repositories using Git, but block the direct download of release binaries (.exe, .zip) for all non-developer users. For abuse of Teams, while the C2 may be internal, any subsequent data exfiltration would still need to leave the network. Strict egress filtering that denies all traffic by default and only allows connections to known-good, categorized sites can prevent attackers from successfully stealing data, even if they establish a foothold.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.