Email Bombing and DNS MX Records Used to Deploy AOBackdoor by Blitz Brigantine

A threat group tracked as Blitz Brigantine is using email bombing and fake Microsoft Teams support to gain remote access via the built-in Windows Quick Assist application.

Pulse ID: 69b82e0c4131df40e70da0ac
Pulse Link: https://otx.alienvault.com/pulse/69b82e0c4131df40e70da0ac
Pulse Author: cryptocti
Created: 2026-03-16 16:21:32

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CyberSecurity #DNS #Email #InfoSec #Microsoft #MicrosoftTeams #OTX #OpenThreatExchange #Windows #bot #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange