By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New phishing attacks against companies
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > New phishing attacks against companies
Mobile

New phishing attacks against companies

News Room
Last updated: 2026/03/07 at 11:10 AM
News Room Published 7 March 2026
Share
New phishing attacks against companies
SHARE

Microsoft Defender experts have presented a new threat report where they warn of new strategies in phishing attacks against business computers. Cybercriminals do not rest, they are always ahead of defense systems and once again surprise with their “audacity” and “originality.”

Phishing attacks continue to grow and, together with ransomware, are the great threat in cybersecurity. In the last three years there has been a 119% increase in these threats, which in addition to their number, stand out for the variation in malicious campaigns. The strategy here doesn’t involve breaching a highly sophisticated security system, inventing a new zero-day vulnerability, or anything that comes to mind when you hear the word “hacking.” The attackers simply devised a system, certainly ingenious, to infiltrate corporate computers using legitimate software.

Novel phishing attacks

It all starts with sending emails containing fake meeting invitations, PDF documents and other malicious links. When a targeted user clicks on a link to update a popular application such as Microsoft Teams, Zoom, Google Meet, or Adobe Reader, they are actually downloading malware to their computer.

But here’s the thing: Microsoft discovered that the malicious files were digitally signed using an abusive Extended Validation (EV) certificate issued to a company called TrustConnect Software PTY LTD.

Now, EV certificates are not easy to obtain, since they require strict identity verification by the Certification Authority. As ESET Distinguished Researcher Aryeh Goretsky noted in the comments, an EV certificate does not automatically prevent antivirus software from scanning a file, but it does give it a higher reputation score. The Proofpoint report adds that “when used by threat actors, they can help criminals evade signature-based detections”.

When a user downloads it, malware lays the foundation for the entire operation. It first copies itself to the Program Files directory to simulate a legitimate application, registers itself as a Windows service, and creates a run key in the system registry to start every time the computer is turned on. Once it takes over an infected computer, the malware uses encrypted PowerShell commands to silently install legitimate remote monitoring and management (RMM) tools such as ScreenConnect, Tactical RMM, and Mesh Agent.

Since corporate IT departments use these same tools daily to manage company computers, malicious network traffic is easily embedded. Attackers gain persistent backdoor into corporate networkwhich includes remote desktop control and the execution of commands at the system level, without raising any red flags. According to the Microsoft report, attackers even install several RMM tools, just in case a security team detects and removes one.

Once full control of the network is established, Attackers can do pretty much whatever they want with affected computers. They can breach internal servers to steal intellectual property, customer databases, or financial records. Or they can move laterally from a single infected laptop directly to the primary domain controller. The possibilities are endless.

This is a constant threat, and Microsoft recommends that companies and employees Take extreme precautions with any download of files whose security is not absolute. You can see the full report on the Microsoft security blog.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article This Handy USB Gadget From Costco Cleans Your Tech (And Charges It Too) – BGR This Handy USB Gadget From Costco Cleans Your Tech (And Charges It Too) – BGR
Next Article Valve questions if it can release Steam Machine in 2026 Valve questions if it can release Steam Machine in 2026
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Can These Tiny Plastic Squares Cure Your Phone Addiction? I Had to Find Out
Can These Tiny Plastic Squares Cure Your Phone Addiction? I Had to Find Out
News
Get this MacBook Air for under 0 — a budget-friendly laptop for work, travel, or home
Get this MacBook Air for under $200 — a budget-friendly laptop for work, travel, or home
News
The Galaxy S26 Ultra’s privacy display has problems
The Galaxy S26 Ultra’s privacy display has problems
News
Why There’s Simply No Need For Disc Drives Anymore – BGR
Why There’s Simply No Need For Disc Drives Anymore – BGR
News

You Might also Like

The rain in Seville is wonderful and now it is also converted into energy with the new CSIC solar panels
Mobile

The rain in Seville is wonderful and now it is also converted into energy with the new CSIC solar panels

5 Min Read
Despite its age, Nvidia’s Shield TV still receives updates and it’s not over
Mobile

Despite its age, Nvidia’s Shield TV still receives updates and it’s not over

3 Min Read
Andrés Mendoza from Manage Engine: “adaptation is measured by the real impact on the income statement”
Mobile

Andrés Mendoza from Manage Engine: “adaptation is measured by the real impact on the income statement”

4 Min Read
Deloitte creates physical AI solutions with NVIDIA Omniverse libraries for industrial transformation
Mobile

Deloitte creates physical AI solutions with NVIDIA Omniverse libraries for industrial transformation

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?