Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Fake Zoom meeting 'update' silently installs unauthorized version of monitoring tool abused by cybercriminals to spy on victims

0
Medium
Published: Sun Mar 01 2026 (03/01/2026, 05:26:47 UTC)
Source: AlienVault OTX General

Description

A sophisticated scam campaign is targeting users with a fake Zoom meeting website that automatically downloads and installs an unauthorized version of Teramind, a legitimate workforce monitoring solution. The attackers create a convincing imitation of a Zoom video call, complete with fake participants and audio, to lure victims. After a short delay, an 'Update Available' prompt appears, leading to the silent installation of the monitoring software. The altered Teramind installer is configured to run stealthily and avoid detection by security tools. This campaign is particularly dangerous as it misuses legitimate commercial software, making it difficult for traditional antivirus tools to detect. The attackers gain full surveillance capabilities over the victim's device, including keylogging, screen capture, and file monitoring.

AI-Powered Analysis

AILast updated: 03/02/2026, 12:10:28 UTC

Technical Analysis

This threat involves a social engineering campaign that targets users by mimicking a Zoom meeting environment on a fraudulent website (http://uswebzoomus.com/zoom/). The attackers create a convincing fake Zoom call interface, complete with fake participants and audio, to lure victims into believing they are in a legitimate video conference. After a short delay, the site prompts users with an 'Update Available' message, which initiates the silent download and installation of a modified version of Teramind, a legitimate workforce monitoring software. This altered installer is designed to operate stealthily, avoiding detection by conventional antivirus and endpoint security tools. Once installed, the unauthorized Teramind instance grants attackers comprehensive surveillance capabilities, including keylogging, screen capturing, and file monitoring, effectively turning the victim’s device into a spying tool. The campaign abuses legitimate software, complicating detection and mitigation efforts. The threat leverages multiple MITRE ATT&CK techniques such as user execution (T1204), masquerading (T1036), and persistence mechanisms (T1542). No known CVEs or exploits in the wild are associated with this campaign, but the use of social engineering and stealth tactics increases its effectiveness. Indicators of compromise include specific file hashes and the malicious domain uswebzoomus.com.

Potential Impact

Organizations worldwide face significant privacy and security risks from this campaign. The silent installation of surveillance software compromises confidentiality by enabling attackers to capture sensitive information such as keystrokes, screenshots, and files. This can lead to intellectual property theft, credential harvesting, and exposure of confidential communications. The stealthy nature of the malware reduces the likelihood of timely detection, increasing dwell time and potential damage. Enterprises relying heavily on remote collaboration tools like Zoom are particularly vulnerable, as users may be more inclined to trust Zoom-related prompts. The misuse of legitimate software also complicates incident response and forensic analysis, potentially delaying remediation. This threat can affect individual users, small businesses, and large enterprises alike, especially those with remote or hybrid workforces. The campaign could also be leveraged for targeted espionage or broader cybercrime activities, amplifying its impact.

Mitigation Recommendations

To mitigate this threat, organizations should implement multi-layered defenses beyond standard antivirus solutions. First, educate users about the risks of unsolicited update prompts, especially from unofficial sources, emphasizing verification of URLs and digital signatures before downloading software. Deploy application allowlisting to restrict installation of unauthorized software, particularly modified versions of legitimate tools like Teramind. Use endpoint detection and response (EDR) solutions capable of behavioral analysis to detect stealthy monitoring activities such as keylogging and screen capturing. Network monitoring should include DNS and URL filtering to block access to known malicious domains like uswebzoomus.com. Implement strict web proxy policies to prevent access to suspicious or untrusted websites. Regularly audit installed software and verify the integrity of workforce monitoring tools through cryptographic hashes. Employ multi-factor authentication and credential monitoring to reduce the impact of potential credential theft. Incident response plans should include procedures for identifying and removing unauthorized monitoring software. Finally, collaborate with threat intelligence providers to stay updated on emerging indicators and tactics related to this campaign.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.malwarebytes.com/blog/scams/2026/02/fake-zoom-meeting-update-silently-installs-surveillance-software"]
Adversary
null
Pulse Id
69a3ce17229e0cab06e67286
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashad0a22e393e9289deac0d8d95d8118b5
hash39359ac4c6f23c26809f44526c37411bbfc68e2f
hash941afee582cc71135202939296679e229dd7cced
hash644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa

Url

ValueDescriptionCopy
urlhttp://uswebzoomus.com/zoom/

Domain

ValueDescriptionCopy
domainuswebzoomus.com

Threat ID: 69a57ab332ffcdb8a20f8734

Added to database: 3/2/2026, 11:55:31 AM

Last enriched: 3/2/2026, 12:10:28 PM

Last updated: 3/2/2026, 9:48:45 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses