• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

Pretend Zoom and Google Meet Phishing Campaigns Deploy Teramind Surveillance Software program

Admin by Admin
February 28, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Menace actors are executing subtle phishing campaigns that impersonate Zoom and Google Meet to silently deploy Teramind onto Home windows units.

Whereas Teramind is a professional enterprise endpoint monitoring product, scammers are abusing its stealth options to conduct unauthorized surveillance.

The An infection Chain and Supply Mechanism

The assault depends on fabricated touchdown pages that mimic official video communication instruments. A now-defunct Zoom marketing campaign utilized the area uswebzoomus[.]com, whereas an lively Google Meet variant operates from googlemeetinterview[.]click on.

The lively web site shows a faux Microsoft Retailer web page, quietly putting in a malicious MSI installer on the sufferer’s gadget whereas displaying a faux obtain button.​

Curiously, the attackers use an unmodified Teramind binary. The installer depends on a built-in .NET customized motion referred to as ReadPropertiesFromMsiName.

By embedding a 40-character hex string within the filename, the installer extracts the attacker’s particular occasion ID.

This intelligent method permits a single binary to serve a number of risk actor accounts just by altering the filename.​

As soon as executed, the installer runs a pre-flight connectivity verify, termed CheckHosts, towards the hardcoded Command and Management (C2) server, rt.teramind.co. If the machine can not attain the server, the set up course of aborts.​

If the connection is profitable, the software program installs in “Hidden Agent” mode (TMSTEALTH = 1).

Based on Malwarebytes, this stealth deployment hides all taskbar icons and program record entries, leaving the sufferer with no visible indication of the continued surveillance.

Moreover, the MSI exposes built-in SOCKS5 proxy help, which may enable attackers to disguise C2 site visitors to evade network-level detection.

To keep up persistence, the marketing campaign deploys two extremely resilient companies that robotically restart if terminated.​

Malicious Companies Deployed

Service Identify Show Identify Executable Privilege Stage
tsvchst Service Host svc.exe -service LocalSystem
pmon Efficiency Monitor pmon.exe LocalSystem

Indicators of Compromise (IOCs)

Safety groups ought to monitor their networks for the next indicators related to this marketing campaign.​

Kind Indicator Description
SHA-256 644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa Malicious MSI Installer
MD5 AD0A22E393E9289DEAC0D8D95D8118B5 Malicious MSI Installer
Area googlemeetinterview[.]click on Lively Google Meet Lure
Area uswebzoomus[.]com Offline Zoom Lure
C2 Server rt.teramind.co Default C2 Callback

Defenders can establish compromised units by trying to find the ProgramData listing GUID {4CEC2908-5CE4-48F0-A717-8FC833D8017A}.

Moreover, safety groups ought to alert on the tsvchst and pmon companies working on non-corporate machines, or the surprising loading of the tm_filter.sys and tmfsdrv2.sys kernel drivers.​

Organizations ought to proactively block MSI executions from person obtain directories and implement browser insurance policies that warn towards unrecognized domains.

To take away the unauthorized software program, directors should run msiexec /x {4600BEDB-F484-411C-9861-1B4DD6070A23} /qb, manually delete the related ProgramData listing, and reboot the system to completely unload the kernel drivers from reminiscence.

Observe us on Google Information, LinkedIn, and X to Get Instantaneous Updates and Set GBH as a Most popular Supply in Google.

​

Tags: campaignsDeployFakeGoogleMeetPhishingSoftwaresurveillanceTeramindZoom
Admin

Admin

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Pretend Zoom and Google Meet Phishing Campaigns Deploy Teramind Surveillance Software program

Pretend Zoom and Google Meet Phishing Campaigns Deploy Teramind Surveillance Software program

February 28, 2026
Marathon may very well have a shot as Server Slam hits it large on Steam

Marathon may very well have a shot as Server Slam hits it large on Steam

February 28, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved