By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Attackers exploit Zoom and Teams impersonations to deliver ScreenConnect malware – News
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Attackers exploit Zoom and Teams impersonations to deliver ScreenConnect malware – News
News

Attackers exploit Zoom and Teams impersonations to deliver ScreenConnect malware – News

News Room
Last updated: 2025/08/26 at 7:30 AM
News Room Published 26 August 2025
Share
SHARE

A new report out today from human behavior security company Abnormal AI Inc. details how attackers are currently exploiting the trust users place in everyday workplace communications to deliver remote access malware.

The report details an ongoing campaign that leverages convincing impersonations of videoconferencing platforms such as Zoom Communications Inc. and Microsoft Teams to trick users into installing ConnectWise ScreenConnect, a legitimate remote monitoring and management tool that, once abused, gives adversaries full control over victim systems.

Phishing schemes are far from new, but where this operation becomes interesting is that it shifts tactics by persuading targets to install what they believe is standard business software. Potential victims are targeted by emails from compromised accounts, lending them authenticity and include timely hooks like tax season or meeting invitations.

Once the target clicks through on the phishing email, they are redirected to artificial intelligence-generated phishing pages or file-sharing platforms that deliver ScreenConnect. In some cases, links lead directly to live ScreenConnect sessions, bypassing installation entirely.

Social engineering isn’t the only method used by the attackers in the campaign. Obfuscation techniques such as SendGrid domain wrapping, open redirect exploits and Cloudflare Workers hosting have been used to disguise malicious links. The obfuscation techniques used are noted in the report as difficult to detect by even advanced detection systems because the traffic appears to originate from trusted providers.

Another technique used involves segmenting links with base64 encoding, evading signature-based security tools as well.

Once installed, ScreenConnect gives the attackers administrator-level access and allows them to move laterally, harvest credentials and launch secondary phishing campaigns from inside compromised environments. Abnormal AI’s researchers observed adversaries inserting malicious links into ongoing email threads, making the attacks appear as natural continuations of legitimate business discussions.

The methodology is also proving popular among hacking communities, the report detailing how dark web vendors are selling prepackaged “ScreenConnect Revolution” kits that include hidden virtual network computing capabilities, Windows Defender bypasses and session restoration features.

Some sellers were found to be offering turnkey deployments for as little as $6,000, complete with training and after-sales support, effectively offering remote access trojans-as-a-service. Other sellers were found to be offering access to already compromised networks with hundreds of connected hosts, priced between $500 and $2,000 per network.

The researchers estimate that there are more than 900 organizations that have been targeted across education, religious institutions, healthcare, financial services, insurance and technology. Though most victims are in the U.S., organizations in Canada, the U.K. and Australia were also affected.

“This campaign serves as a critical reminder that modern threats increasingly weaponize trusted systems rather than circumvent them,” the report concludes.

Abnormal’s researchers recommended enterprises adopt defenses including AI-powered email security, enhanced endpoint monitoring for unauthorized remote tools and zero-trust architectures, along with updating awareness training so staff know what to look for.

Image: News/Reve

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.

About News Media

News Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of News, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — News Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, News Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article How Do I Protect My Logo and Other Brand Assets Legally? (2025 Guide)
Next Article This Samsung 2025 43-inch 4K TV is now under £250
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

A Comparative Performance Analysis of SymTax on Five Citation Recommendation Datasets | HackerNoon
Computing
3 Creative Ways To Repurpose Old SD Cards – BGR
News
Dell Pro 32 Plus 4K USB-C Hub Monitor Review 
Gadget
MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers
Computing

You Might also Like

News

3 Creative Ways To Repurpose Old SD Cards – BGR

6 Min Read
News

Trump threatens tariffs on countries with digital taxes

2 Min Read
News

The Best VPN Services of 2025

36 Min Read
News

Exclusive: I put a leaked iPhone 17 Pro Max case on an iPhone 16 Pro Max

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?