Malware And CampaignsCampaign

MEOWBACKCONN intrusion chain uses Microsoft Teams MSI and encrypted PowerShell backdoor

April 3, 2026The DFIR Report

The DFIR Report describes MEOWBACKCONN initial access via a malicious Microsoft Teams MSI installer, followed by encrypted PowerShell backdoor activity and credential access via SAM registry dumping.

The DFIR Report recently observed MEOWBACKCONN again in the wild:
➡️ Initial Access: Malicious Microsoft Teams MSI Installer
➡️ Execution: Encrypted PowerShell backdoor
➡️ Credential Access: SAM Registry Dump
The DFIR Report
malwaremicrosoftincident responsemicrosoftmalwareincident response

See what experts are saying right now

This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.

← Back to Cyber Security