Tagged: Malware, MSOC in the Philippines, Phishing Campaign, RMM Backdoors, Teams, Zoom
- This topic has 0 replies, 1 voice, and was last updated 1 week, 2 days ago by
Rameses Quiambao.
- AuthorPosts
- March 10, 2026 at 3:06 pm #1823
Rameses Quiambao
ParticipantSummary
Security researchers uncovered a phishing campaign distributing digitally signed malware disguised as legitimate workplace applications such as Microsoft Teams, Zoom, and Adobe Acrobat Reader.
The attackers used valid Extended Validation (EV) code-signing certificates to make the malicious executables appear legitimate, helping them bypass user suspicion and some security controls.
Once executed, the malware installs Remote Monitoring and Management (RMM) tools to establish persistent remote access to the victim system.
Research Source
According to Microsoft Defender Experts and reporting by Cyber Security News, the campaign began in February 2026 and targeted enterprise users through phishing emails disguised as meeting invitations, invoices, financial documents, and routine workplace communications.
The attackers leveraged trusted brand names and legitimate digital signatures to increase the success rate of the phishing campaign.
Technical Details
The malicious files were disguised as legitimate application installers with filenames such as:
• msteams.exe
• zoomworkspace.clientsetup.exe
• adobereader.exe
• trustconnectagent.exe
• invite.exeAll files were signed using an EV certificate issued to TrustConnect Software PTY LTD, making them appear legitimate to users and certain security tools.
Once executed, the malware copies itself into:
‘C:\Program Files’ to mimic a legitimate application installation.Persistence mechanisms include:
• Creating a Windows service for automatic startup
• Adding a Registry Run key at:‘HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run’ with the value TrustConnectAgent.
The malware then connects to the command-and-control domain:
‘trustconnectsoftware[.]com’
Observed Attack Activity
Threat Actor
• Currently unknownInitial Access
• Phishing emails containing malicious installers disguised as common workplace softwareExecution & Persistence
• Copies executable to Program Files
• Registers as a Windows service
• Adds Registry Run key for persistenceCommand and Control
• Outbound communication with trustconnectsoftware[.]comMalware Deployment
The malware installs multiple RMM backdoors:
• ScreenConnect
• Tactical RMM
• Mesh AgentPost-Exploitation Capabilities
• Remote system control
• Lateral movement across networks
• Data exfiltration
• Deployment of additional payloads
• Persistent access through multiple backdoorsThe use of multiple RMM tools simultaneously ensures continued access if one backdoor is removed.
Impact
Successful compromise may allow attackers to:
• Gain persistent remote access to enterprise endpoints
• Move laterally within corporate networks
• Harvest sensitive data
• Deploy additional malware or ransomware
• Maintain stealth access using legitimate remote administration toolsBecause RMM platforms are legitimate software, they may evade detection by traditional signature-based security solutions.
Mitigation
Recommended defensive measures include:
• Block unauthorized RMM tools using Windows Defender Application Control (WDAC) or AppLocker
• Enable Multi-Factor Authentication (MFA) on all approved remote management platforms
• Deploy Safe Links and Safe Attachments protections in email systems
• Enable Zero-hour Auto Purge (ZAP) for malicious email removal
• Enable cloud-delivered protection for endpoint antivirus
• Implement Attack Surface Reduction (ASR) rules to block suspicious process behavior
• Monitor for suspicious installation of RMM tools across endpointsReferences:
Signed Malware Masquerading as Teams, Zoom Apps Drops RMM Backdoors
- AuthorPosts
- You must be logged in to reply to this topic.