A cunning vishing (voice phishing) campaign is exploiting the trust users place in corporate communication and support tools. Threat actors are impersonating IT support personnel on Microsoft Teams and socially engineering employees into granting them remote access via the legitimate Windows Quick Assist tool. Once connected, the attackers guide the victim to download a malicious loader, which then deploys a multi-stage, fileless .NET payload. This payload is decrypted and executed entirely in memory, making it invisible to traditional file-based security scanners. This attack, analyzed by Trustwave SpiderLabs, demonstrates how attackers can chain together legitimate tools to bypass technical defenses, making user awareness and behavioral detection more critical than ever.
The attack is a textbook example of blending social engineering with living-off-the-land techniques. The stages are as follows:
ciscocyber[.]com) to download a file named updater.exe.updater.exe is a .NET Core 8.0 loader. It connects to a second domain (jysync[.]info) to fetch an encryption key and an encrypted payload. The payload is then decrypted (using AES-CBC and XOR) and executed directly in memory using .NET reflection, never touching the disk in its final, malicious form.This campaign leverages several MITRE ATT&CK techniques:
T1566.004 - Spearphishing Voice (Vishing).T1204.002 - User Execution: Malicious File, as the user is guided to download and run the initial loader.T1027.002 - Software Packing (the .NET wrapper) and T1027 - Obfuscated Files or Information (encrypted payload). The primary technique is T1620 - Reflective Code Loading, where the malware is executed from memory.T1105 - Ingress Tool Transfer is used to download the initial loader and the second-stage payload.T1219 - Remote Access Software is used by abusing the legitimate Quick Assist tool.While the final payload was not detailed, a successful intrusion of this type can lead to significant consequences. The fileless nature of the malware allows it to operate undetected for longer periods. Potential impacts include:
| Type | Value | Description |
|---|---|---|
domain |
ciscocyber[.]com |
Malicious domain used to host the initial loader (updater.exe). |
domain |
jysync[.]info |
Malicious domain used to host the encrypted payload and decryption key. |
file_name |
updater.exe |
The name of the .NET loader downloaded by the victim. |
QuickAssist.exe. While it is a legitimate tool, its usage may be rare in some organizations. Correlate its execution with subsequent suspicious activity, such as downloads of new executables or PowerShell activity. This is an application of D3FEND's D3-PA: Process Analysis.ciscocyber[.]com, jysync[.]info). Monitor for .NET processes making external network connections, which can be anomalous.D3-EDL: Executable Denylisting.updater.exe from running.The most critical defense is training users to recognize and report social engineering attempts and to never grant remote access from unsolicited requests.
Block the execution of `QuickAssist.exe` if it is not a sanctioned IT support tool in your organization.
Mapped D3FEND Techniques:
Use EDR to detect the suspicious chain of events: `QuickAssist.exe` runs, followed by a browser downloading an executable, followed by that executable making new network connections.
The most direct technical countermeasure to this specific vishing campaign is to block the tool being abused for remote access. Use an application control technology like Windows Defender Application Control (WDAC) or AppLocker to create a rule that explicitly denies the execution of QuickAssist.exe for all users, or at least for all non-IT support staff. If your organization has a standardized tool for remote support (e.g., SCCM Remote Control, TeamViewer, BeyondTrust), there is no business reason for Quick Assist to be available. By denylisting this executable, you break the attack chain at the remote access stage, rendering the attacker's social engineering efforts ineffective even if the user is successfully tricked.
To detect this activity post-compromise, focus on the behavioral anomalies. Configure your SIEM to correlate events and alert on the following pattern: 1) A QuickAssist.exe process is started. 2) Within 10 minutes on the same host, a web browser process (chrome.exe, msedge.exe) downloads a new executable file. 3) That new executable (e.g., updater.exe) is then observed making an outbound network connection to a low-reputation domain. This sequence of events is highly indicative of this attack TTP. By analyzing the pattern of resource access—from remote control software to browser to network—you can create a high-fidelity detection that identifies the attack even though it uses legitimate tools and fileless techniques.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats