Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Disguised as Teams and Zoom Apps Targets Enterprises

Malware Disguised as Teams and Zoom Apps Targets Enterprises

Posted on March 10, 2026 By CWS

A sophisticated phishing campaign has emerged, targeting enterprise users by disguising malicious software as popular workplace applications such as Microsoft Teams, Zoom, and Adobe Acrobat Reader. This new threat is notable for using legitimate-looking digital signatures to evade detection by users and security systems.

Details of the Phishing Campaign

First identified in February 2026, the campaign involves multiple waves of phishing emails sent to organizations. These messages often mimic meeting invitations, financial documents, or routine business notices, enticing recipients to download what appears to be a software update or application installer. The malicious files have names mimicking real applications, including msteams.exe and zoomworkspace.clientsetup.exe.

The threat actor behind this campaign has abused Extended Validation (EV) certificates issued to TrustConnect Software PTY LTD, making these files appear legitimate. Microsoft’s Defender Experts detected these campaigns through telemetry, highlighting a calculated, multi-faceted attack strategy.

How the Malware Works

Once downloaded, the malware installs remote monitoring and management (RMM) tools like ScreenConnect, Tactical RMM, and Mesh Agent, providing the attacker with remote control over the compromised device. These tools enable lateral network movement, data harvesting, and additional payload deployment without triggering typical security alerts.

The malware establishes persistence by creating secondary copies under system directories, registering them as Windows services, and modifying registry keys to ensure automatic execution on startup. The malware also communicates with a command and control (C2) domain, executing PowerShell commands to install RMM clients silently.

Mitigation and Security Recommendations

Organizations should take proactive measures to block unauthorized RMM tools using Windows Defender Application Control or AppLocker. Enforcing multifactor authentication on all approved RMM systems is crucial. Implementing Safe Links, Safe Attachments, and Zero-hour Auto Purge can help intercept malicious emails before they reach users.

Maintaining cloud-delivered protection on endpoint antivirus is essential for quickly identifying new malware variants. Deploying attack surface reduction rules targeting untrusted executables and processes created via PsExec or WMI can further enhance security across all endpoints.

For more updates, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates on cybersecurity threats.

Cyber Security News Tags:Adobe Acrobat Reader, cyber threat, Cybersecurity, digital signature, enterprise security, IT security, Malware, Microsoft Teams, network security, phishing campaign, remote monitoring, RMM tools, software attack, Threat Actors, Zoom

Post navigation

Previous Post: Cylake Secures $45M Funding for On-Premises Cybersecurity
Next Post: CISA Highlights Exploited Vulnerabilities in Key Software

Related Posts

Supply Chain Security Mitigating Third-Party Risks Supply Chain Security Mitigating Third-Party Risks Cyber Security News
Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure Cyber Security News
Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files Cyber Security News
PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182) PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182) Cyber Security News
Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT Cyber Security News
Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Webinar on Securing AI Agents Against Cyber Threats
  • OpenClaw’s Rise Exposes Vulnerability Tracking Challenges
  • Escape Secures $18 Million to Enhance Automated Pentesting
  • Yoma Fleet Enhances Cybersecurity with AccuKnox SIEM
  • SIM Swap Attacks Highlight Security Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Webinar on Securing AI Agents Against Cyber Threats
  • OpenClaw’s Rise Exposes Vulnerability Tracking Challenges
  • Escape Secures $18 Million to Enhance Automated Pentesting
  • Yoma Fleet Enhances Cybersecurity with AccuKnox SIEM
  • SIM Swap Attacks Highlight Security Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News