The Fake Zoom–Teramind Campaign and Why SASE Changes Everything
Active Threat Advisory
On February 24, 2026, Malwarebytes researchers confirmed that a fraudulent Zoom meeting page at uswebzoomus[.]com/zoom/ is being used to silently deploy surveillance software on Windows endpoints.
At the time of reporting, zero antivirus vendors on VirusTotal flagged the payload as malicious. Separate DefenderXDR FileProfile analysis cited by Microsoft MVP Steven Lim indicated the file was not being flagged by Microsoft Defender at the time of review. The file had reached a reported global prevalence of 1,437 observations within twelve days of emergence. This post details the full attack chain and outlines why a SASE-aligned architecture materially changes the defensive outcome.
Executive Summary
In February 2026, a carefully engineered social engineering campaign emerged that weaponizes Teramind, a legitimate commercial employee monitoring platform, to covertly surveil victims who believe they are joining a standard Zoom video call.
- The attack does not rely on exploit kits.
- It does not rely on zero-day vulnerabilities.
- It does not rely on custom malware.
It relies on psychology, legitimate software, and architectural blind spots.
At BLOKWORX, we evaluate emerging threats through the lens of structural prevention. This campaign is a textbook example of why legacy endpoint-centric security models are increasingly insufficient, and why Secure Access Service Edge represents a necessary evolution in enterprise defense. What follows is a technical breakdown of the attack chain and the architectural implications every security leader should understand.
The Attack Chain: A Structured Breakdown
Stage One: The Lure – A Weaponized Waiting Room
The following breakdown represents BLOKWORX structured analysis of the attack sequence as reported by Malwarebytes:
Victims land on a fraudulent domain after receiving what appears to be a legitimate Zoom meeting invite via email, SMS, or workplace messaging platforms.
The site renders a highly convincing Zoom waiting room experience. The deception is not cosmetic. It is behavioral. The malicious sequence activates only after detecting genuine human interaction such as mouse movement or keystrokes. Automated scanners that do not interact see nothing suspicious.
Scripted participants appear to join the call in sequence. Authentic Zoom join chimes play. Background conversation audio reinforces legitimacy. The environment feels real because it is engineered to feel real.
Stage Two: Psychological Infrastructure
The page displays a persistent “Network Issue” overlay. Audio is choppy. Video appears degraded. This is intentional.
By manufacturing frustration, the attacker creates a psychological state where an update prompt feels reasonable rather than suspicious. The victim does not feel tricked. They feel like they are solving a normal technical issue.
This is refined social engineering. The attacker shapes emotional context before presenting the payload.
Stage Three: Forced Update and Silent Download
Roughly ten seconds after interaction, a full-screen message appears: “Update Available: A new version is available for download.” A countdown timer runs. There is no close button. No dismiss option. No alternative.
When the timer reaches zero, two events occur simultaneously:
- A Windows Installer file downloads silently.
- The page transitions to a convincing Microsoft Store replica showing “Zoom Workplace” installing.
From the user’s perspective, a legitimate update is resolving the issue. In reality, the malicious installer has already landed in the Downloads folder. The entire sequence completes in under thirty seconds.
Indicators of Compromise
The following indicators were published by Malwarebytes researchers:
- Malicious domain: uswebzoomus[.]com
- MSI filename: zoom_agent_x64_s-i(__941afee582cc71135202939296679e229dd7cced) (1).msi
- SHA-256: 644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa
- Teramind instance ID: 941afee582cc71135202939296679e229dd7cced
At the time of public reporting, the file showed a reported global prevalence of 1,437 observations according to DefenderXDR FileProfile analysis, and zero VirusTotal detections were observed.
Stage Four: Legitimate Software, Illegitimate Deployment
The payload is not custom malware. It is a stealth-mode deployment of Teramind, a legitimate commercial workforce monitoring platform designed for enterprise environments. Teramind offers a stealth configuration engineered to run without visible presence. No taskbar icon. No system tray indicator. No obvious installed-program entry. Once installed, the agent can log keystrokes, capture screenshots, monitor application activity, track websites visited, and transmit telemetry to a remote server controlled by the attacker. Teramind has publicly stated it has no affiliation with the threat actors involved and did not authorize this deployment. The installer also includes sandbox and debugger detection mechanisms and removes staging artifacts post-installation to limit forensic visibility. The attackers did not need to build advanced malware. They leveraged professionally engineered commercial software.
Why Signature-Based Detection Struggles
At the time of disclosure, zero security vendors on VirusTotal flagged the installer as malicious.
This is not surprising.
Traditional antivirus tools analyze file signatures and known malicious behavior patterns. The payload consists of legitimate, digitally signed Teramind binaries. There are no malicious signatures embedded in the file itself.
The malicious element is not the code.
It is the context of delivery and absence of consent.
Endpoint-centric detection cannot reliably evaluate intent. That is the structural blind spot this campaign exposes.
The Architectural Mismatch
This incident highlights a fundamental problem in traditional security design.
Users operate in browsers.
Applications are cloud-delivered.
Collaboration tools live on the open internet.
Yet many organizations still concentrate enforcement at the endpoint or legacy perimeter. The attack originated in a browser session and completed before endpoint tools could meaningfully evaluate intent. Secure Access Service Edge addresses this mismatch by enforcing security policy at the cloud edge, between the user and the destinations they access.
Security follows the session.
The SASE Framework
Secure Access Service Edge was defined by Gartner in 2019 as the convergence of networking and security into a unified, cloud-delivered architecture. Since that definition, industry reporting indicates that enterprise adoption has accelerated dramatically, with a majority of organizations now pursuing explicit SASE strategies.
SASE unifies:
- Secure Web Gateway
- Cloud Access Security Broker
- Zero Trust Network Access
- Firewall as a Service
- DNS filtering
- Remote Browser Isolation
This is not product consolidation. It is architectural realignment.
How a SASE-Aligned Architecture Changes the Outcome
Secure Web Gateway
Real-time URL filtering and threat intelligence can block malicious domains before content is rendered.
DNS Filtering
Malicious domain resolution can be denied before any TCP session is established.
Remote Browser Isolation
Web page code executes in an isolated cloud container rather than on the local device. Automatic downloads cannot reach the endpoint because rendering occurs remotely and sessions are discarded at termination.
Zero Trust Network Access
If compromise occurs, identity-based least privilege access limits lateral movement and reduces blast radius.
Cloud Governance Controls
An unauthorized monitoring agent transmitting keystrokes and screenshots externally can trigger anomaly detection and policy enforcement at the network layer. Each pillar addresses a specific stage of the attack chain.
Together, they move enforcement to where the attack actually happens.
The Living-Off-the-Land Shift
This campaign reflects a broader evolution in adversarial tradecraft.
Rather than building custom malware, attackers increasingly deploy legitimate commercial software. This approach allows them to inherit:
- Digital signatures
- Stability
- Built-in persistence
- Vendor trust
The distinguishing factor between a legitimate Teramind deployment and a criminal one is not the software. It is consent and context.
Detection strategies that rely solely on identifying malicious code will struggle in this model.
Architectural enforcement becomes critical.
Incident Response Guidance
For Enterprise Security Teams
If an employee visited uswebzoomus[.]com/zoom/ and executed the installer:
- Isolate the endpoint immediately.
- Hunt for the published filename, hash, and instance ID.
- Rotate credentials from a known clean device.
- Review DNS and web logs for related activity across the environment.
Treat the device as compromised until forensic review is complete.
For Individual Users
If you downloaded and ran the installer:
- Assume the device is compromised.
- Change passwords for financial and high-value accounts from a separate clean device.
- Seek professional remediation if the device is used for work or sensitive activity.
- Access Zoom directly via the installed application or manually type zoom.us rather than trusting unsolicited links.
The Fake Zoom–Teramind campaign is not an anomaly.
It is a preview.
The convergence of sophisticated social engineering, legitimate commercial tooling, and delivery-stage evasion will become more common. Organizations that invest exclusively in endpoint detection without extending policy enforcement to the session layer accept structural vulnerability.
SASE is not a feature upgrade.
It is a philosophical reorientation of enterprise security from defending a perimeter that no longer meaningfully exists to enforcing policy at the point where every session begins.
The question is not whether this shift will become necessary.
The question is whether you implement it before or after your next incident.




