Security researchers from Microsoft's Defender team have identified an ongoing phishing campaign, active since February 2026, that leverages fake Zoom and Microsoft Teams meeting invitations to compromise corporate networks. The attack is notable for its use of a stolen Extended Validation (EV) digital certificate, which is used to sign the malicious payloads. This tactic significantly increases the malware's ability to evade security software and trick users. Victims are lured into downloading what appears to be a legitimate meeting client update, which is in fact an installer for remote monitoring and management (RMM) tools like ScreenConnect and MeshAgent. The campaign's goal is to establish a persistent foothold for subsequent activities, including data theft and ransomware deployment, demonstrating a dangerous evolution in phishing TTPs.
The campaign targets corporate office workers, who are accustomed to receiving meeting invitations daily. The attack flow is as follows:
msteams.exe, adobereader.exe) is the malware installer. Because it is signed with a valid EV certificate from 'TrustConnect Software PTY LTD,' it may not be flagged by endpoint security and the user's operating system will show a trusted publisher prompt.This campaign combines several effective techniques to achieve its goals:
The immediate impact is the establishment of a persistent backdoor into the corporate network. With RMM access, attackers can:
This incident also has a broader impact on trust in the digital certificate ecosystem. It proves that even an EV certificate, which requires a more stringent validation process, is not an infallible indicator of safety. Organizations must move beyond simple signature checking and adopt more behavior-based detection methods.
ScreenConnect.Client.exeMeshAgent.exeTrustConnect Software PTY LTDpowershell -enc <base64_string>Connections to RMM provider domainsscreenconnect.com or meshcentral.com from user workstations.Executable Allowlisting.msiexec.exe or powershell.exe spawning an RMM agent.Use application allowlisting to prevent unauthorized RMM tools from running.
Educate users to be skeptical of unsolicited software updates and to verify them through official channels.
Remove local admin rights from standard users to prevent malware from installing.
The phishing campaign using fake meeting invites and a stolen EV certificate begins.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.