Social Engineering Scam Uses Fake Microsoft Teams Page to Push Malicious PowerShell Script

According to a first-hand account updated on March 1, 2026, a crypto and Web3 professional narrowly avoided installing malware after joining what appeared to be a routine Microsoft Teams call set up via a familiar Telegram contact and Calendly link. The attackers used a spoofed Teams domain that blocked mobile access, then pressured the target on desktop to run a PowerShell command fetching code from teams.livescalls.com. The incident highlights how compromised industry accounts and realistic meeting interfaces are being weaponized to target high‑value crypto participants and potentially drain wallets or steal credentials.