Zoom Update Scam Hits 1,437 Windows Users with Hidden Surveillance in 12 Days


A fake Zoom update scam infected 1,437 Windows users worldwide in just 12 days. Attackers used a rogue version of Teramind, a real employee monitoring tool, to spy on victims. Microsoft Defender for Endpoint first spotted the campaign on February 11, 2026.

Teramind issued an official statement confirming no ties to the attackers. “We have no affiliation with these threat actors and did not authorize any such deployment,” the company said in a blog post dated February 25, 2026. Malwarebytes detailed the scam in their February 24 report, noting its reliance on social engineering over complex code.

The scam starts at uswebzoomus[.]com/zoom/. This site mimics a Zoom waiting room perfectly. It pings attackers when someone arrives. Fake participants like Matthew Karlsson, James Whitmore, and Sarah Chen join with chimes and looped audio.

This only triggers on real user clicks. Bots and scanners miss it entirely. A fake network issue banner appears. Audio stutters. Video freezes. Users blame their own setup.

Ten seconds in, a pop-up demands an update. A countdown runs with no close button. At zero, it downloads malware silently. A phony Microsoft Store screen distracts while the file drops into Downloads. No permissions asked.

A fake Zoom website (Source – Malwarebytes)

Attack Mechanics

The malware file is zoom_agent_x64_s-i(__941afee582cc71135202939296679e229dd7cced)(1).msi. Its SHA-256 hash is 644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa. VirusTotal showed no flags from Microsoft Defender at discovery.

Attackers repurposed Teramind’s stealth mode. No custom code needed. The installer hides in out_stealth builds. It renames to dwm.exe and nests in C:\ProgramData{4CEC2908-5CE4-48F0-A717-8FC833D8017A}. A tsvchst service ensures persistence.

It grabs PC name, user account, keyboard language, and locale. Data flows to attacker servers. Keystrokes log. Screenshots snap. Web activity tracks. Clipboard and files monitor.

Sandbox detection kicks in too. It spots research environments and shifts behavior. Temp files self-delete post-install. Traces vanish.

Advance hunting (Source – Linkedin)

Key Indicators of Compromise (IoCs)

TypeValue
File Hash (SHA-256)644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa
Malicious Domainuswebzoomus[.]com
Teramind Instance ID941afee582cc71135202939296679e229dd7cced
Malicious File Namezoom_agent_x64_s-i(__941afee582cc71135202939296679e229dd7cced)(1).msi
Agent Binary Namedwm.exe
Installation PathC:\ProgramData{4CEC2908-5CE4-48F0-A717-8FC833D8017A}
Persistence Servicetsvchst

Detection and Removal Steps

  • Scan with updated antivirus like Microsoft Defender or Malwarebytes.
  • Check for C:\ProgramData{4CEC2908-5CE4-48F0-A717-8FC833D8017A}.
  • Look for tsvchst service in Task Manager or services.msc. Stop and delete if found.
  • Run full system scan in safe mode.
  • Reset browser and clear Downloads folder.

If infected, assume compromise. Change passwords from a clean device. Report to IT for work machines.

Prevention Tips for Zoom Update Scams

  • Launch Zoom from desktop app, not browser links.
  • Type zoom.us directly. Verify URLs.
  • Ignore pop-ups. Check official site for updates.
  • Enable MFA on accounts. Use EDR like Microsoft Defender for Endpoint.
  • Train on phishing: Fake meetings often rush or frustrate.

Zoom recommends official channels only in their security blog. Stay safe from Zoom phishing, fake updates, and surveillance malware.

FAQ

How many users got hit by this Zoom scam?

1,437 Windows users across the globe in 12 days, from February 11 to 23, 2026.

What does the Teramind rogue agent do?

It logs keystrokes, takes screenshots, tracks web use, clipboard, and files silently.

Is Teramind safe to use?

Yes, for authorized purposes. Teramind confirmed no involvement

How to check if I’m infected?

Search for tsvchst service or the hidden folder. Scan with Defender. Block the hash and domain.

Can antivirus catch this?

Traditional signature-based tools may miss it initially. Use behavior detection in tools like Defender. Updates rolled out February 26.

How to avoid fake Zoom updates?

Download from zoom.us only. Avoid unsolicited links. Watch for fake waiting rooms with issues.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages