Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Disguised as Teams and Zoom Apps Targets Enterprises

Malware Disguised as Teams and Zoom Apps Targets Enterprises

Posted on March 10, 2026 By CWS

A sophisticated phishing campaign has emerged, targeting enterprise users by disguising malicious software as popular workplace applications such as Microsoft Teams, Zoom, and Adobe Acrobat Reader. This new threat is notable for using legitimate-looking digital signatures to evade detection by users and security systems.

Details of the Phishing Campaign

First identified in February 2026, the campaign involves multiple waves of phishing emails sent to organizations. These messages often mimic meeting invitations, financial documents, or routine business notices, enticing recipients to download what appears to be a software update or application installer. The malicious files have names mimicking real applications, including msteams.exe and zoomworkspace.clientsetup.exe.

The threat actor behind this campaign has abused Extended Validation (EV) certificates issued to TrustConnect Software PTY LTD, making these files appear legitimate. Microsoft’s Defender Experts detected these campaigns through telemetry, highlighting a calculated, multi-faceted attack strategy.

How the Malware Works

Once downloaded, the malware installs remote monitoring and management (RMM) tools like ScreenConnect, Tactical RMM, and Mesh Agent, providing the attacker with remote control over the compromised device. These tools enable lateral network movement, data harvesting, and additional payload deployment without triggering typical security alerts.

The malware establishes persistence by creating secondary copies under system directories, registering them as Windows services, and modifying registry keys to ensure automatic execution on startup. The malware also communicates with a command and control (C2) domain, executing PowerShell commands to install RMM clients silently.

Mitigation and Security Recommendations

Organizations should take proactive measures to block unauthorized RMM tools using Windows Defender Application Control or AppLocker. Enforcing multifactor authentication on all approved RMM systems is crucial. Implementing Safe Links, Safe Attachments, and Zero-hour Auto Purge can help intercept malicious emails before they reach users.

Maintaining cloud-delivered protection on endpoint antivirus is essential for quickly identifying new malware variants. Deploying attack surface reduction rules targeting untrusted executables and processes created via PsExec or WMI can further enhance security across all endpoints.

For more updates, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates on cybersecurity threats.

Cyber Security News Tags:Adobe Acrobat Reader, cyber threat, Cybersecurity, digital signature, enterprise security, IT security, Malware, Microsoft Teams, network security, phishing campaign, remote monitoring, RMM tools, software attack, Threat Actors, Zoom

Post navigation

Previous Post: Cylake Secures $45M Funding for On-Premises Cybersecurity
Next Post: CISA Highlights Exploited Vulnerabilities in Key Software

Related Posts

Two U.S. CyberSecurity Pros Plead Guilty for Working as ALPHV/BlackCat Affiliates Two U.S. CyberSecurity Pros Plead Guilty for Working as ALPHV/BlackCat Affiliates Cyber Security News
Critical Splunk Vulnerability Allows Remote Code Execution Critical Splunk Vulnerability Allows Remote Code Execution Cyber Security News
Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details Cyber Security News
100+ Cybersecurity Predictions 2026 for Industry Experts as the AI Adapted in the Wild 100+ Cybersecurity Predictions 2026 for Industry Experts as the AI Adapted in the Wild Cyber Security News
LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly Cyber Security News
New Malware Via WhatsApp Exfiltrate Contacts to Attack Server and Deploys Malware New Malware Via WhatsApp Exfiltrate Contacts to Attack Server and Deploys Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline
  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline
  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark