Signed malware impersonating workplace apps deploys RMM backdoors
Multiple phishing campaigns were identified using workplace meeting lures, PDF attachments, and abuse of legitimate binaries to deliver signed malware. The attacks used digitally signed executables masquerading as legitimate software to install remote monitoring and management (RMM) tools like ScreenConnect, Tactical RMM, and Mesh Agent. These tools enabled attackers to establish persistence and move laterally within compromised environments. The malware was signed using an Extended Validation certificate issued to TrustConnect Software PTY LTD. The campaigns demonstrate how familiar branding and trusted digital signatures can be exploited to bypass user suspicion and gain an initial foothold in enterprise networks.
Pulse ID: 69a77ace20faf9114cbb120b
Pulse Link: https://otx.alienvault.com/pulse/69a77ace20faf9114cbb120b
Pulse Author: AlienVault
Created: 2026-03-04 00:20:30
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #PDF #Phishing #RAT #Rust #ScreenConnect #bot #AlienVault









