Threat Actors Abuse Microsoft Teams, GitHub, and Phone Link to Blend In and Evade Detection

Living Off the Land: Threat Actors Increasingly Abuse Legitimate Platforms Like Teams and GitHub

HIGH
May 12, 2026
6m read
Threat ActorThreat IntelligenceSecurity Operations

Related Entities

Full Report

Executive Summary

Threat actors in 2026 are refining their tactics by 'living off the trusted platform,' a strategy that involves abusing legitimate, well-known services to carry out attacks. Instead of relying on their own custom infrastructure, which can be easily identified and blocked, attackers are co-opting services like Microsoft Teams, GitHub, and the Windows Phone Link application. This approach makes their malicious activity extremely difficult to detect, as it is hidden within the vast streams of legitimate traffic associated with these trusted platforms. The trend includes using Teams for malware delivery, GitHub for hosting malicious code, and Phone Link for bypassing multi-factor authentication, demonstrating a strategic move to exploit implicit trust and bypass traditional security controls.

Threat Overview

The 'living off the trusted platform' strategy is a sophisticated evolution of the 'living off the land' technique. Instead of just using native OS tools, attackers are now using globally trusted cloud services.

  • Malware Delivery via Microsoft Teams: Attackers are using compromised accounts or social engineering to send malicious files and links through Teams chat. Because Teams is a primary internal communication tool, users are more likely to trust and open files received through it. This bypasses email gateways, the traditional chokepoint for malware scanning.

  • Malware Distribution via GitHub: GitHub is being used to host malware, C2 configurations, and as a distribution point for compromised software installers. Attackers create public or private repositories that appear legitimate, using them as a stable and reputable source for downloading malicious payloads.

  • MFA Bypass via Windows Phone Link: Financially motivated cybercrime groups are exploiting the Windows Phone Link application. This tool syncs a user's phone with their Windows PC, including SMS messages. If an attacker has compromised the user's PC, they can use Phone Link to intercept one-time passcodes (OTPs) sent via SMS for multi-factor authentication, allowing them to take over online accounts.

  • C2 via Blockchain: Some actors are using transactions on public blockchains for command-and-control (C2) communications. They can embed commands or exfiltrated data into transaction metadata, creating a highly resilient and difficult-to-block C2 channel.

Technical Analysis

The effectiveness of this strategy lies in its ability to blend in. Security tools are typically configured to trust traffic to and from major platforms like Microsoft, Google, and GitHub.

Phone Link SMS Interception Attack Chain:

  1. Initial Compromise: The attacker gains access to the victim's Windows PC through phishing, malware, or other means.
  2. Persistence & Discovery: The attacker discovers that the victim uses the Phone Link application to sync with their Android phone.
  3. Action on Objectives: The attacker initiates a login to a sensitive account of the victim (e.g., a bank account).
  4. MFA Interception: The bank sends an MFA OTP via SMS to the victim's phone. The Phone Link app syncs this SMS to the compromised Windows PC.
  5. Capture: The attacker's malware on the PC reads the incoming notification or the message database for Phone Link, capturing the OTP.
  6. Account Takeover: The attacker enters the captured OTP into the bank login page and gains access to the account.

MITRE ATT&CK Techniques

Impact Assessment

The primary impact of this trend is the degradation of existing security controls. Security tools that rely on blacklisting bad IPs or domains are rendered ineffective when the malicious activity is hosted on microsoft.com or github.com. This forces a paradigm shift for defenders, from blocking known-bad to identifying anomalous behavior within known-good platforms. Successful attacks can lead to malware infection, data breaches, financial fraud, and account takeover, all while being much harder to detect and trace.

IOCs — Directly from Articles

No specific Indicators of Compromise were provided in the source articles, as this trend focuses on abusing legitimate infrastructure.

Cyber Observables — Hunting Hints

  • Teams Monitoring: Look for users sending executable files or password-protected archives through Teams, which is often against policy and a common attacker TTP. Monitor for a single user sending the same link or file to a large number of other users in a short time.
  • GitHub Traffic: Analyze traffic to GitHub. While blocking it is not feasible, monitor for the download of executable files or .zip archives from non-official or newly created repositories, especially from non-developer workstations.
  • Phone Link Usage: While legitimate, security teams could generate a list of users with Phone Link installed to understand the potential attack surface for SMS interception.

Detection & Response

  • Detection:

    • Behavioral Analytics: Detection must be behavior-based. Monitor for anomalies within the trusted platforms. For example, a user account that has never used GitHub before suddenly downloading release assets should be flagged. This aligns with D3FEND User Behavior Analysis.
    • API Monitoring: Utilize the security APIs of platforms like Microsoft 365 and GitHub to ingest audit logs into a SIEM. Correlate activity across platforms to build a richer picture and detect suspicious sequences of events.
    • Endpoint Monitoring: EDR is still crucial. It can detect the malicious payload after it has been delivered via Teams or downloaded from GitHub.
  • Response:

    • When abuse is detected, the response must be swift. If a Teams user is sending malware, their account must be immediately disabled and investigated.
    • Use the platform's own security tools to respond. For example, if a GitHub repo is found to be malicious, report it to GitHub for takedown.

Mitigation

  • Zero Trust Principles: Do not implicitly trust any application or service. All traffic should be inspected, and all access should be authenticated and authorized. Assume that any platform can be used for malicious purposes.
  • Phishing-Resistant MFA: The Phone Link SMS interception attack is a perfect example of why SMS-based MFA is weak. Move to stronger, phishing-resistant forms of MFA like FIDO2 security keys or authenticator apps with number matching and push notifications. This is a core part of D3FEND Multi-factor Authentication (D3-MFA).
  • User Training: Educate users that even trusted platforms like Teams can be abused. Train them to be suspicious of unexpected file shares or links, even from known colleagues, and to verify through a separate communication channel.
  • Application Control: Where possible, use application control to restrict the use of certain high-risk applications or features if they are not required for business.

Timeline of Events

1
May 12, 2026
This article was published

MITRE ATT&CK Mitigations

Migrate from SMS-based MFA to phishing-resistant alternatives like FIDO2 to defeat interception attacks via tools like Phone Link.

Audit

M1047enterprise

Ingest and analyze audit logs from trusted platforms (M365, GitHub) to detect anomalous behavior within legitimate traffic streams.

Educate users that legitimate platforms can be abused and to be cautious of unexpected requests or files, even from known contacts.

While broad blocking is not feasible, use proxies to inspect traffic to these platforms and block downloads of high-risk file types from untrusted sources.

D3FEND Defensive Countermeasures

The abuse of Windows Phone Link to intercept SMS-based OTPs is a textbook case for why organizations must adopt phishing-resistant Multi-factor Authentication. This technique directly counters the threat by moving away from interceptable factors. Instead of SMS, companies should enforce the use of FIDO2/WebAuthn security keys or authenticator apps that use push notifications with number matching. These methods are not vulnerable to simple interception on a compromised endpoint. A FIDO2 key requires physical presence, and a number matching push notification requires the user to actively confirm the login on their trusted device. By making this transition, organizations can completely neutralize the threat of SMS interception for account takeover.

To detect the abuse of platforms like Teams and GitHub, Web Session Activity Analysis is essential. This involves moving beyond network-level indicators and analyzing application-level logs. Security teams must ingest audit logs from Microsoft 365 and GitHub into their SIEM. Then, they can build detection rules for anomalous behavior. For example, a rule could flag a user who has never shared a file in Teams before suddenly sending an executable to 50 people. Another rule could detect a non-developer workstation downloading a .zip file from a GitHub releases page. This focus on application-layer behavior within trusted services is the only reliable way to spot malicious activity that is otherwise hidden in legitimate traffic.

While attackers are using trusted platforms for ingress, Outbound Traffic Filtering remains a key control for detecting C2 and exfiltration. For the abuse of GitHub, organizations can use sophisticated web proxies to apply more granular policies. For example, a policy could allow developers to browse github.com and clone repositories using Git, but block the direct download of release binaries (.exe, .zip) for all non-developer users. For abuse of Teams, while the C2 may be internal, any subsequent data exfiltration would still need to leave the network. Strict egress filtering that denies all traffic by default and only allows connections to known-good, categorized sites can prevent attackers from successfully stealing data, even if they establish a foothold.

Sources & References

Threat Intelligence: May 11, 2026
ReSecurity (resecurity.com) May 11, 2026
11th May – Threat Intelligence Report
Check Point Research (checkpoint.com) May 11, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Living off the LandMicrosoft TeamsGitHubWindows Phone LinkMFA BypassTTPEvasion

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.