Microsoft Teams Users Being Targeted in State-Linked Phishing Campaign

Security researchers warn that professionals in finance, technology, and consulting are being targeted by highly realistic malicious Teams meeting links

3
Microsoft Teams Users Being Targeted in State-Linked Phishing Campaign
Security, Compliance & RiskNews

Published: April 6, 2026

Kristian McCann

Security researchers have warned of a new wave of sophisticated social engineering attacks linked to North Korea, exploiting fake Microsoft Teams domains to deliver malicious software.

The campaign, tied to a threat group known as UNC1069, appears highly targeted and professional, focusing on individuals and organizations rather than random users.

Researchers from the Security Alliance identified a newly registered malicious domain, onlivemeet[.]com, designed to impersonate Microsoft Teams meeting links. They highlighted that even seasoned professionals could be vulnerable due to the realistic appearance and strategic delivery of the attacks.

The scope and sophistication of these efforts underscore the growing threat posed by state-backed cyber operations targeting professional environments.

Inside the UNC1069 Campaign

UNC1069 is a financially motivated threat group with a history of targeting professionals through nuanced social engineering strategies. Unlike generic phishing campaigns, the group carefully designs interactions to appear legitimate and contextually relevant, leveraging trust built from previous communications or professional settings.

It’s not just convincing false links that are being used. In the current malware campaign, researchers observed several key delivery methods. For example, attackers revive old conversations from compromised Telegram and LinkedIn accounts to make outreach appear familiar to recipients. They also pose as partners, investors, or recruiters, sending messages through fake or impersonated Slack channels.

This hijacking of old accounts may help these links bypass built-in security features of Microsoft Teams, such as link scanning, since they come from previously approved accounts.

Additionally, attackers schedule meetings via legitimate tools like Calendly to enhance credibility and reduce suspicion. These techniques allow them to integrate seamlessly into professional workflows, increasing the likelihood that targets will engage with the malicious content.

Once a user clicks a provided meeting link, they are redirected to a fake Microsoft Teams interface. These counterfeit pages are highly convincing, replicating the platform’s design and functionality. A typical message on the page claims that the β€œTeamsFx SDK” has been deprecated and requires an immediate update.

When victims download what they believe is a necessary fix, they inadvertently install a Remote Access Trojan (RAT), granting attackers persistent access to sensitive systems and data.

The campaign’s targeting is sector-specific, with professionals in technology, finance, and consulting identified as primary victims.

Context, Implications, and Defenses

The focus on professionals and organizations highlights that this is not a casual or opportunistic campaign. The suspected state-backed nature of UNC1069 suggests a level of resources and coordination capable of sustaining a long-term, highly targeted attack effort.

Organizations must recognize that conventional phishing defenses may not be sufficient against adversaries who can blend seamlessly into everyday communications.

To counter these threats, experts recommend several precautionary measures. First, carefully inspect URLs before clicking, as the text displayed in platforms like Slack or Telegram may mask the true destination. Second, verify meeting invitations through secondary channels, especially when they involve downloads or urgent actions. Third, approach unexpected software update prompts with caution, particularly when they originate outside official vendor portals.

Organizations should also prioritize user education and proactive security measures. Regular awareness training can help employees recognize unusual communications, while technical controls, such as URL filtering and email authentication protocols, can reduce the likelihood of successful compromises. The combination of human vigilance and automated defenses is essential in confronting campaigns of this sophistication.

UNC1069’s use of compromised accounts, legitimate services like Calendly, and realistic fake platforms illustrates the evolving nature of social engineering. By understanding the attack chain and implementing layered defenses, organizations can mitigate the risks posed by these high-resource campaigns.

Defending Against Malicious Meetings

The emergence of UNC1069’s Teams-focused campaign serves as a reminder that professional environments remain prime targets for cybercriminals and state-backed threat actors alike.

The increasing sophistication of these attacks, coupled with the exploitation of trusted collaboration tools, poses a serious risk to organizations handling sensitive business communications, even those with existing cyber training programs.

Moving forward, organizations must take a proactive stance, combining technology solutions, such as managing old accounts, with enhanced user education to anticipate and respond to such threats.

Ultimately, the UNC1069 campaign highlights the evolving challenges of modern cybersecurity. As threat actors continue to refine social engineering techniques and exploit trusted platforms, the need for robust, multi-layered defenses in professional settings has never been greater.

Call RecordingCollaboration SecurityCommunication Compliance​Endpoint SecuritySecurity and Compliance
Featured

Share This Post