Google Warns of New Attack Using Email Bombing and Microsoft Teams to Exploit Urgency

In a concerning escalation of social engineering tactics, threat actors are exploiting Microsoft Teams to deploy a novel malware strain dubbed “Snow,” leveraging email bombing to overwhelm victims before posing as IT support via trusted collaboration channels—a technique that bypasses traditional email security gateways by weaponizing platform trust.

The Anatomy of a Trust Exploit: How Snow Malware Infiltrates via Teams

The attack chain begins with a barrage of spam emails—sometimes hundreds within minutes—designed to provoke anxiety and urgency in the target. Once the victim’s inbox is saturated, attackers initiate contact through Microsoft Teams, often spoofing internal IT or helpdesk identities. Using Teams’ native chat and file-sharing capabilities, they deliver a malicious payload disguised as a security update or troubleshooting tool. What makes this particularly insidious is the abuse of Teams’ trusted status within enterprise environments. unlike email, which is frequently scrutinized by secure email gateways (SEGs), internal Teams communications often bypass such controls entirely, relying instead on user vigilance—a notoriously weak link.

According to Mandiant’s analysis, the “Snow” malware itself is a lightweight, modular dropper written in Rust, enabling cross-platform execution with minimal forensic footprint. It establishes persistence via scheduled tasks and registry modifications, then contacts a command-and-control (C2) server using encrypted DNS-over-HTTPS (DoH) queries to evade network detection. The malware’s modular design allows threat actors to dynamically load secondary payloads—such as credential stealers, ransomware loaders, or lateral movement tools—based on the victim’s environment, making it highly adaptable to both Windows and macOS enterprise fleets.

Why Platform Trust Is the New Attack Surface

This incident underscores a fundamental shift in adversary strategy: rather than exploiting software vulnerabilities, attackers are increasingly targeting the human-layer trust embedded in collaboration platforms. Microsoft Teams, Slack, and Zoom have become de facto infrastructure in hybrid work environments, yet their security models still lag behind email in terms of threat detection depth. Unlike email, which benefits from decades of anti-phishing innovation, real-time behavioral analysis within Teams chats remains limited. For instance, while Microsoft Defender for Office 365 can scan attachments and links in Teams, it lacks native anomaly detection for social engineering patterns like sudden file shares from dormant accounts or urgent language mimicking IT escalation protocols.

Why Platform Trust Is the New Attack Surface
Teams Microsoft Microsoft Teams

This gap is especially dangerous in zero-trust architectures that assume internal networks are compromised but still rely on identity verification alone. As one cloud security architect noted, “We’ve built zero-trust networks that verify who you are, but not whether your behavior makes sense in context.” The Snow campaign exploits exactly this blind spot—using legitimate credentials and approved channels to bypass both network and identity-based controls.

Enterprise Mitigation: Beyond User Training

Organizations relying solely on annual phishing simulations are dangerously exposed. Effective mitigation requires a layered approach: enabling Microsoft Defender for Cloud Apps to monitor for anomalous file shares and impossible travel alerts within Teams; enforcing strict file type policies that block executables and scripts in chat; and integrating user and entity behavior analytics (UEBA) to detect deviations in communication patterns—such as a finance employee suddenly receiving file transfers from an unknown internal user at 2 a.m.

Critically, companies should consider disabling external Teams access by default unless explicitly required, a setting often overlooked during tenant configuration. Leveraging Microsoft’s attack simulation training within Teams—rather than just email—can aid condition users to scrutinize internal messages with the same skepticism applied to external emails.

“The real vulnerability isn’t in the code—it’s in the assumption that internal equals safe. Until we treat collaboration platforms with the same suspicion as email, these attacks will keep working.”

— Lina Torres, Principal Security Engineer, Microsoft AI

The Bigger Picture: Collaboration Tools as Cyber Battlegrounds

The Snow malware campaign is not an isolated incident but a symptom of a broader trend: as enterprises consolidate workflows into platforms like Teams, those platforms become high-value targets for supply chain and social engineering attacks. This dynamic creates tension between productivity and security—a trade-off Microsoft has historically leaned into, prioritizing ease of apply over granular controls. Yet, as adversaries prove adept at abusing legitimacy, the pressure mounts for platforms to embed deeper telemetry and real-time intervention capabilities without sacrificing usability.

This also raises questions about platform lock-in. Organizations deeply invested in the Microsoft 365 ecosystem may locate it hard to migrate to alternatives with stronger native social engineering defenses, even as threats evolve. Conversely, open-source collaboration tools like Mattermost or Rocket.Chat, while offering greater transparency, often lack the enterprise-grade threat intelligence integrations needed to detect such campaigns at scale—highlighting a growing gap in the secure collaboration market.

What This Means for the Future of Work Security

The Snow malware incident serves as a wake-up call: securing the modern workplace requires rethinking trust boundaries. No longer can enterprises assume that internal communication channels are inherently safe. Instead, they must adopt a mindset where every file share, link, and message—regardless of origin—is subject to scrutiny. As one Mandiant researcher observed during a recent briefing, “We’re seeing the death of the ‘trusted insider’ myth—not since insiders are malicious, but because attackers have become indistinguishable from them.”

For security teams, the imperative is clear: extend detection and response capabilities into the collaboration layer, invest in behavioral analytics that understand context, and stop treating user awareness as the final line of defense. In an era where the most dangerous exploits wear the mask of legitimacy, vigilance must be systemic, not sporadic.

Photo of author

Sophie Lin - Technology Editor

Sophie is a tech innovator and acclaimed tech writer recognized by the Online News Association. She translates the fast-paced world of technology, AI, and digital trends into compelling stories for readers of all backgrounds.

Road Rage Incident in Lynn, MA Escalates to Violent Street Fight

Title: How to Support the Iron County Sheriff’s Office Animal Unit with Cash Donations

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.