{"id":12272,"date":"2026-02-28T23:31:31","date_gmt":"2026-02-28T23:31:31","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12272"},"modified":"2026-02-28T23:31:31","modified_gmt":"2026-02-28T23:31:31","slug":"pretend-zoom-and-google-meet-phishing-campaigns-deploy-teramind-surveillance-software-program","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12272","title":{"rendered":"Pretend Zoom and Google Meet Phishing Campaigns Deploy Teramind Surveillance Software program"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Menace actors are executing subtle phishing campaigns that impersonate Zoom and Google Meet to silently deploy Teramind onto <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/uac-0001-hackers-target-ics-devices\/\" type=\"post\" id=\"143685\" target=\"_blank\" rel=\"noreferrer noopener\">Home windows units<\/a>. <\/p>\n<p>Whereas Teramind is a professional enterprise endpoint monitoring product, scammers are abusing its stealth options to conduct unauthorized surveillance.<\/p>\n<h2 class=\"wp-block-heading\" id=\"the-infection-chain-and-delivery-mechanism\"><strong>The An infection Chain and Supply Mechanism<\/strong><\/h2>\n<p>The assault depends on fabricated touchdown pages that mimic official video communication instruments. A now-defunct Zoom marketing campaign utilized the area\u00a0<code>uswebzoomus[.]com<\/code>, whereas an lively Google Meet variant operates from\u00a0<code>googlemeetinterview[.]click on<\/code>. <\/p>\n<p>The lively web site shows a<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/beware-fake-microsoft-teams-oyster-malware\/\" type=\"post\" id=\"92029\"> <\/a><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/beware-fake-microsoft-teams-oyster-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">faux Microsoft Retailer web page<\/a>, quietly putting in a malicious MSI installer on the sufferer\u2019s gadget whereas displaying a faux obtain button.<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intel\/2026\/02\/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive\" target=\"_blank\" rel=\"noreferrer noopener\"\/>\u200b<\/p>\n<p>Curiously, the attackers use an unmodified Teramind binary. The installer depends on a built-in .NET customized motion referred to as\u00a0<code>ReadPropertiesFromMsiName<\/code>. <\/p>\n<p>By embedding a 40-character hex string within the filename, the installer extracts the attacker\u2019s particular occasion ID. <\/p>\n<p>This intelligent method permits a single binary to serve a number of risk actor accounts just by altering the filename.<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intel\/2026\/02\/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive\" target=\"_blank\" rel=\"noreferrer noopener\"\/>\u200b<\/p>\n<p>As soon as executed, the installer runs a pre-flight connectivity verify, termed\u00a0<code>CheckHosts<\/code>, towards the hardcoded <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/aeternum-c2-infrastructure\/\" type=\"post\" id=\"179240\" target=\"_blank\" rel=\"noreferrer noopener\">Command and Management (C2) server<\/a>,\u00a0<code>rt.teramind.co<\/code>. If the machine can not attain the server, the set up course of aborts.<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intel\/2026\/02\/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive\" target=\"_blank\" rel=\"noreferrer noopener\"\/>\u200b<\/p>\n<p>If the connection is profitable, the software program installs in \u201cHidden Agent\u201d mode (<code>TMSTEALTH = 1<\/code>). <\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intel\/2026\/02\/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Based on Malwarebytes<\/a>, this stealth deployment hides all taskbar icons and program record entries, leaving the sufferer with no visible indication of the continued surveillance. <\/p>\n<p>Moreover, the MSI exposes built-in SOCKS5 proxy help, which may enable attackers to disguise C2 site visitors to evade network-level detection.<\/p>\n<p>To keep up persistence, the marketing campaign deploys two extremely resilient companies that robotically restart if terminated.<a rel=\"nofollow\" target=\"_blank\" rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intel\/2026\/02\/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive\"\/>\u200b<\/p>\n<p id=\"malicious-services-deployed\"><strong>Malicious Companies Deployed<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table class=\"has-fixed-layout\">\n<thead>\n<tr>\n<th class=\"has-text-align-left\" data-align=\"left\">Service Identify<\/th>\n<th class=\"has-text-align-left\" data-align=\"left\">Show Identify<\/th>\n<th class=\"has-text-align-left\" data-align=\"left\">Executable<\/th>\n<th class=\"has-text-align-left\" data-align=\"left\">Privilege Stage<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><code>tsvchst<\/code><\/td>\n<td>Service Host<\/td>\n<td><code>svc.exe -service<\/code><\/td>\n<td>LocalSystem<\/td>\n<\/tr>\n<tr>\n<td><code>pmon<\/code><\/td>\n<td>Efficiency Monitor<\/td>\n<td><code>pmon.exe<\/code><\/td>\n<td>LocalSystem<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<h2 class=\"wp-block-heading\" id=\"indicators-of-compromise-iocs\"><strong>Indicators of Compromise (IOCs)<\/strong><\/h2>\n<p>Safety groups ought to monitor their networks for the next indicators related to this marketing campaign.<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intel\/2026\/02\/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive\" target=\"_blank\" rel=\"noreferrer noopener\"\/>\u200b<\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table class=\"has-fixed-layout\">\n<thead>\n<tr>\n<th class=\"has-text-align-left\" data-align=\"left\">Kind<\/th>\n<th class=\"has-text-align-left\" data-align=\"left\">Indicator<\/th>\n<th class=\"has-text-align-left\" data-align=\"left\">Description<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>SHA-256<\/td>\n<td><code>644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa<\/code><\/td>\n<td>Malicious MSI Installer<\/td>\n<\/tr>\n<tr>\n<td>MD5<\/td>\n<td><code>AD0A22E393E9289DEAC0D8D95D8118B5<\/code><\/td>\n<td>Malicious MSI Installer<\/td>\n<\/tr>\n<tr>\n<td>Area<\/td>\n<td><code>googlemeetinterview[.]click on<\/code><\/td>\n<td>Lively Google Meet Lure<\/td>\n<\/tr>\n<tr>\n<td>Area<\/td>\n<td><code>uswebzoomus[.]com<\/code><\/td>\n<td>Offline Zoom Lure<\/td>\n<\/tr>\n<tr>\n<td>C2 Server<\/td>\n<td><code>rt.teramind.co<\/code><\/td>\n<td>Default C2 Callback<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Defenders can establish compromised units by trying to find the\u00a0<code>ProgramData<\/code>\u00a0listing GUID\u00a0<code>{4CEC2908-5CE4-48F0-A717-8FC833D8017A}<\/code>. <\/p>\n<p>Moreover, safety groups ought to alert on the\u00a0<code>tsvchst<\/code>\u00a0and\u00a0<code>pmon<\/code>\u00a0companies working on non-corporate machines, or the surprising loading of the\u00a0<code>tm_filter.sys<\/code>\u00a0and\u00a0<code>tmfsdrv2.sys<\/code>\u00a0kernel drivers.<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intel\/2026\/02\/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive\" target=\"_blank\" rel=\"noreferrer noopener\"\/>\u200b<\/p>\n<p>Organizations ought to proactively block MSI executions from person obtain directories and implement<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/bug-disclosure-policies-that-researchers-actually-use\/\" type=\"post\" id=\"179218\" target=\"_blank\" rel=\"noreferrer noopener\"> browser insurance policies <\/a>that warn towards unrecognized domains. <\/p>\n<p>To take away the unauthorized software program, directors should run\u00a0<code>msiexec \/x {4600BEDB-F484-411C-9861-1B4DD6070A23} \/qb<\/code>, manually delete the related\u00a0<code>ProgramData<\/code>\u00a0listing, and reboot the system to completely unload the kernel drivers from reminiscence.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong>Observe us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cyber-threat-intel\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LinkedIn<\/a>, and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Instantaneous Updates and Set GBH as a Most popular Supply in\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.google.com\/preferences\/source?q=https:\/\/gbhackers.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google<\/a>.<\/strong><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intel\/2026\/02\/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive\" target=\"_blank\" rel=\"noreferrer noopener\"\/>\u200b<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Menace actors are executing subtle phishing campaigns that impersonate Zoom and Google Meet to silently deploy Teramind onto Home windows units. Whereas Teramind is a professional enterprise endpoint monitoring product, scammers are abusing its stealth options to conduct unauthorized surveillance. The An infection Chain and Supply Mechanism The assault depends on fabricated touchdown pages that [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12274,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[3995,2309,67,81,2072,261,802,3868,8032,6129],"class_list":["post-12272","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-campaigns","tag-deploy","tag-fake","tag-google","tag-meet","tag-phishing","tag-software","tag-surveillance","tag-teramind","tag-zoom"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12272"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12272\/revisions"}],"predecessor-version":[{"id":12273,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12272\/revisions\/12273"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/12274"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-15 04:52:10 UTC -->