Security researchers from Microsoft's Defender team have identified an ongoing phishing campaign, active since February 2026, that leverages fake Zoom and Microsoft Teams meeting invitations to compromise corporate networks. The attack is notable for its use of a stolen Extended Validation (EV) digital certificate, which is used to sign the malicious payloads. This tactic significantly increases the malware's ability to evade security software and trick users. Victims are lured into downloading what appears to be a legitimate meeting client update, which is in fact an installer for remote monitoring and management (RMM) tools like ScreenConnect and MeshAgent. The campaign's goal is to establish a persistent foothold for subsequent activities, including data theft and ransomware deployment, demonstrating a dangerous evolution in phishing TTPs.
The campaign targets corporate office workers, who are accustomed to receiving meeting invitations daily. The attack flow is as follows:
msteams.exe, adobereader.exe) is the malware installer. Because it is signed with a valid EV certificate from 'TrustConnect Software PTY LTD,' it may not be flagged by endpoint security and the user's operating system will show a trusted publisher prompt.This campaign combines several effective techniques to achieve its goals:
The immediate impact is the establishment of a persistent backdoor into the corporate network. With RMM access, attackers can:
This incident also has a broader impact on trust in the digital certificate ecosystem. It proves that even an EV certificate, which requires a more stringent validation process, is not an infallible indicator of safety. Organizations must move beyond simple signature checking and adopt more behavior-based detection methods.
| Type | Value | Description |
|---|---|---|
| Process Name | ScreenConnect.Client.exe |
The executable for the ScreenConnect RMM tool. Its presence may be legitimate, but its installation outside of a planned deployment is a major red flag. |
| Process Name | MeshAgent.exe |
The executable for the MeshAgent RMM tool. Similar to ScreenConnect, its unexpected presence is highly suspicious. |
| Certificate Subject | TrustConnect Software PTY LTD |
Any executables signed by this publisher should be considered suspicious and investigated, as their certificate is known to be compromised. |
| Command Line Pattern | powershell -enc <base64_string> |
Encoded PowerShell commands are frequently used by malware to hide their activity. These should always be decoded and analyzed. |
| Network Traffic Pattern | Connections to RMM provider domains |
Unexpected outbound connections to domains like screenconnect.com or meshcentral.com from user workstations. |
Executable Allowlisting.msiexec.exe or powershell.exe spawning an RMM agent.Use application allowlisting to prevent unauthorized RMM tools from running.
Educate users to be skeptical of unsolicited software updates and to verify them through official channels.
Remove local admin rights from standard users to prevent malware from installing.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats