Query Details
//Threat hunting voice phishing for Teams //https://www.linkedin.com/feed/update/urn:li:activity:7168258404447186945/ //Threat hunting voice phishing 👄🐟 (or "vishing") with Copilot 🤖 for Microsoft 365 (Mitre Technique T1598.004) //Download your Teams PSTN usage report and open your report with Copilot Excel. Enter the prompt: //Which "caller number" appear the most time with different unique "Display Name" where the "Call Direction" is inbound and "Success" is No ? //As shown below (right side), Copilot identified the vishing number "XXXXXXX2650" with distinct count of 23 times. Most of these calls will be ended up in voicemail and transcript as email voice email back to the user. //To validate Copilot identified the correct vishing number "XXXXXXX2650", in DefenderXDR Advanced Hunting run the below KQL: EmailEvents | where SenderMailFromAddress contains "noreply_skype_voicemail" | where SenderFromAddress !contains "@" | where SenderFromAddress contains "XXXXXXX2650" | project SenderFromAddress, Subject
This query is part of a threat-hunting exercise focused on identifying voice phishing (vishing) attempts in Microsoft Teams. Here's a simplified summary:
Objective: Identify a phone number frequently used in vishing attempts, where the caller number appears multiple times with different display names, and the call direction is inbound with unsuccessful call attempts.
Steps:
Validation:
In essence, this process helps in detecting and validating potential vishing attempts by analyzing call data and corroborating it with email events.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators