Security

EV-Signed Phishing Installers Drop ScreenConnect

3 min read

Summary

Microsoft Defender Experts uncovered phishing campaigns that use fake meeting, invoice, and document lures to deliver malware installers disguised as trusted apps like Teams, Zoom, and Adobe Reader. What makes this notable is that the installers were signed with an EV certificate and used to deploy legitimate remote management tools such as ScreenConnect and Tactical RMM, giving attackers stealthy initial access that can blend into normal enterprise IT activity.

Need help with Security?Talk to an Expert

Introduction: why this matters

Threat actors are increasingly blending in with legitimate IT operations by deploying commercially available Remote Monitoring and Management (RMM) tools. This campaign raises the bar further by using familiar “workplace app” branding and EV code signing to reduce user suspicion and improve execution rates—making it a practical initial access path in enterprises where users routinely install meeting and document software.

What’s new / key findings

Microsoft Defender Experts observed multiple phishing campaigns attributed to an unidentified threat actor. Key characteristics include:

  • Meeting and document lures: Emails masqueraded as meeting invitations (Teams/Zoom/Google Meet), invoices, financial documents, bids, and organizational notifications.
  • Counterfeit PDFs and spoofed download pages: Some messages delivered fake PDFs with an “Open in Adobe” button that redirected users to a lookalike Adobe download site prompting an “update.”
  • Masquerading executables: Payloads were named to resemble trusted installers, including msteams.exe, adobereader.exe, zoomworkspace.clientsetup.exe, invite.exe, and trustconnectagent.exe.
  • Abuse of trust via EV signing: The droppers were digitally signed with an EV certificate issued to TrustConnect Software PTY LTD, helping them appear legitimate.
  • RMM backdoor deployment: Execution led to installation of RMM tools such as ScreenConnect, Tactical RMM, and Mesh Agent, enabling persistent remote access.

How the intrusion establishes persistence (technical highlights)

In the ScreenConnect-focused chain, the “workspace” executable:

  • Copied itself into C:\Program Files to look like a legitimate installed application.
  • Registered itself as a Windows service for startup persistence.
  • Created an additional autorun via Run key:
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    • Value name: TrustConnectAgent
    • Target: C:\Program Files\Adobe Acrobat Reader\AdobeReader.exe
  • Connected outbound to attacker infrastructure (notably trustconnectsoftware[.]com).
  • Used encoded PowerShell to download additional payloads and invoked msiexec.exe to install ScreenConnect from staged MSI files.

Microsoft noted cases where the MSI appeared unsigned, followed by ScreenConnect binaries signed with revoked certificates, a pattern commonly associated with malicious or unauthorized deployment.

Impact on IT administrators and end users

  • Users are targeted through routine workflows: joining meetings, reviewing invoices, and updating “out-of-date” apps.
  • IT and security teams may see attacker activity blend into normal admin tooling because RMM agents can resemble sanctioned remote support.
  • Risk increases post-compromise: persistence via services/autoruns plus RMM tooling can accelerate credential access, remote control, and lateral movement.

Action items / next steps

  • Harden software installation paths: restrict user-driven installs where feasible; enforce allowlisting (e.g., WDAC/App Control) for “installer-like” executables.
  • Audit RMM usage: inventory approved RMM tools and block or alert on unauthorized agents (ScreenConnect/Tactical RMM/Mesh) and suspicious service creation.
  • Review code-signing trust decisions: treat “signed” as a signal—not proof. Add detection logic for new/rare publishers and unusual EV-signed binaries.
  • Hunt for persistence indicators: look for the TrustConnectAgent Run key, unexpected services, and suspicious msiexec.exe plus encoded PowerShell patterns.
  • Strengthen phishing resilience: reinforce user guidance around “update required” prompts from email/PDFs and use Defender protections to detonate/inspect attachments and links.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Microsoft DefenderphishingRMMScreenConnectcode signing

Related Posts

Security

Dirty Frag Linux Vulnerability Raises Root Risk

Microsoft has warned of active exploitation involving the newly disclosed Dirty Frag Linux local privilege escalation vulnerability, which can help attackers move from a low-privileged account to root. The issue affects kernel networking components such as esp4, esp6, and rxrpc, making it especially important for administrators to review module exposure, restrict local access, and prepare for vendor kernel patches.

Security

AI Agent RCE Flaws in Semantic Kernel Explained

Microsoft Defender researchers disclosed two fixed vulnerabilities in Semantic Kernel that could let prompt injection escalate into host-level remote code execution in AI agents. The findings matter because they show how unsafe tool parameter handling in agent frameworks can turn natural language inputs into code execution paths, raising the stakes for organizations building or securing AI-powered apps.

Security

Microsoft Entra Passkeys: 2026 Passwordless Updates

Microsoft outlined major passkey and account recovery updates across Entra ID, Windows, External ID, and Microsoft Password Manager as part of World Passkey Day. The changes matter for IT teams because they expand phishing-resistant sign-in options, improve recovery security, and continue the retirement of weaker authentication methods such as security questions.

Security

Microsoft AI SOC Report 2026: KuppingerCole Leader

Microsoft says it has been named an Overall Leader and Market Leader in KuppingerCole Analysts’ 2026 Emerging AI Security Operations Center report. The announcement highlights Microsoft’s push beyond traditional SOAR toward AI-driven, agent-assisted security operations in Sentinel and Security Copilot to help SOC teams improve speed, consistency, and scale.

Security

ClickFix macOS Campaign Delivers Infostealers

Microsoft has identified a new ClickFix-style campaign targeting macOS users with fake troubleshooting and utility instructions hosted on blogs and content platforms. Instead of downloading apps, victims are tricked into running Terminal commands that bypass typical macOS app checks and deploy infostealers such as Macsync, SHub Stealer, and AMOS.

Security

AiTM Phishing Campaign Targets Microsoft 365 Users

Microsoft has detailed a large-scale adversary-in-the-middle (AiTM) phishing campaign that used fake code-of-conduct investigations to steal authentication tokens. The attack combined polished social engineering, staged CAPTCHA pages, and a legitimate Microsoft sign-in flow, highlighting why phishing-resistant protections and stronger email defenses matter.