Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Disguised as Teams and Zoom Apps Targets Enterprises

Malware Disguised as Teams and Zoom Apps Targets Enterprises

Posted on March 10, 2026 By CWS

A sophisticated phishing campaign has emerged, targeting enterprise users by disguising malicious software as popular workplace applications such as Microsoft Teams, Zoom, and Adobe Acrobat Reader. This new threat is notable for using legitimate-looking digital signatures to evade detection by users and security systems.

Details of the Phishing Campaign

First identified in February 2026, the campaign involves multiple waves of phishing emails sent to organizations. These messages often mimic meeting invitations, financial documents, or routine business notices, enticing recipients to download what appears to be a software update or application installer. The malicious files have names mimicking real applications, including msteams.exe and zoomworkspace.clientsetup.exe.

The threat actor behind this campaign has abused Extended Validation (EV) certificates issued to TrustConnect Software PTY LTD, making these files appear legitimate. Microsoft’s Defender Experts detected these campaigns through telemetry, highlighting a calculated, multi-faceted attack strategy.

How the Malware Works

Once downloaded, the malware installs remote monitoring and management (RMM) tools like ScreenConnect, Tactical RMM, and Mesh Agent, providing the attacker with remote control over the compromised device. These tools enable lateral network movement, data harvesting, and additional payload deployment without triggering typical security alerts.

The malware establishes persistence by creating secondary copies under system directories, registering them as Windows services, and modifying registry keys to ensure automatic execution on startup. The malware also communicates with a command and control (C2) domain, executing PowerShell commands to install RMM clients silently.

Mitigation and Security Recommendations

Organizations should take proactive measures to block unauthorized RMM tools using Windows Defender Application Control or AppLocker. Enforcing multifactor authentication on all approved RMM systems is crucial. Implementing Safe Links, Safe Attachments, and Zero-hour Auto Purge can help intercept malicious emails before they reach users.

Maintaining cloud-delivered protection on endpoint antivirus is essential for quickly identifying new malware variants. Deploying attack surface reduction rules targeting untrusted executables and processes created via PsExec or WMI can further enhance security across all endpoints.

For more updates, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates on cybersecurity threats.

Cyber Security News Tags:Adobe Acrobat Reader, cyber threat, Cybersecurity, digital signature, enterprise security, IT security, Malware, Microsoft Teams, network security, phishing campaign, remote monitoring, RMM tools, software attack, Threat Actors, Zoom

Post navigation

Previous Post: Cylake Secures $45M Funding for On-Premises Cybersecurity
Next Post: CISA Highlights Exploited Vulnerabilities in Key Software

Related Posts

AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk Cyber Security News
McLaren Health Care Data Breach Exposes 743,000 People Personal Information McLaren Health Care Data Breach Exposes 743,000 People Personal Information Cyber Security News
Water Saci Hackers Leveraging AI Tools to Attack WhatsApp Web Users Water Saci Hackers Leveraging AI Tools to Attack WhatsApp Web Users Cyber Security News
Top 10 Best Supply Chain Risk Management Solutions in 2025 Top 10 Best Supply Chain Risk Management Solutions in 2025 Cyber Security News
Microsoft Urges Action on Critical Windows Updates Microsoft Urges Action on Critical Windows Updates Cyber Security News
Windows BitLocker Vulnerability Let Attackers Elevate Privileges Windows BitLocker Vulnerability Let Attackers Elevate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Early Cyber Weapon ‘fast16’ Revealed by Researchers
  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline
  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Early Cyber Weapon ‘fast16’ Revealed by Researchers
  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline
  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark