How Hackers Are Using Zoom and Microsoft Teams to Spy on 900+ Organizations

Hackers are using new tactics targeting Zoom and Microsoft Teams to plant malicious software into an organization.

3
How Hackers Are Using Zoom and Microsoft Teams to Spy on Over 900 Organizations
Unified CommunicationsLatest News

Published: September 2, 2025

Kristian McCann

Security researchers are raising the alarm about a sophisticated phishing campaign that has successfully targeted more than 900 organizations by gaining access through Zoom and Microsoft Teams.

Cybersecurity company Abnormal has uncovered a new trend in which attackers are abandoning traditional password theft in favor of tricking employees into voluntarily installing spyware.

By mimicking authentic-looking UC meeting invitations and leveraging compromised email threads, criminals are able to slip past even the most vigilant security teams without raising the alarm.

With this threat increasingly deceiving businesses, how can organizations and individuals protect themselves and their UC usage from this emerging risk?

The Anatomy of a Modern Workplace Deception

The sophistication of this campaign sets it apart from conventional phishing attempts.

Instead of relying on obviously suspicious emails or crude impersonation tactics, these attackers have industrialized their strategies through dark web marketplaces that sell complete “attack kits” for ConnectWise ScreenConnect—a legitimate IT administration tool that can become a powerful weapon in the wrong hands.

By using real file-sharing platforms and AI-generated phishing pages, along with compromised email accounts and conversation threads, attackers create a network of correspondence that is harder to distinguish from legitimate communications.

Once a victim is tricked into installing ConnectWise ScreenConnect, attackers lure individuals into granting them administrator-level access to corporate systems. After entry, they launch account takeovers, lateral phishing campaigns, and data theft while blending in with normal IT activity.

The geographic distribution of victims—primarily in the US, UK, Canada, and Australia—suggests these are not opportunistic attacks but meticulously planned campaigns targeting English-speaking markets with high rates of remote work adoption.

The sectoral targeting of education (14.4% of victims), healthcare (9.7%), and financial services (9.4%) indicates attackers understand which industries are most susceptible to disruption and possess valuable data for theft or ransom.

Building Resilience Against Social Engineering

Protection against these advanced attacks requires a multi-layered approach addressing both technological vulnerabilities and human psychology.

The first line of defense involves implementing robust email security solutions powered by AI, which can detect subtle anomalies in communication patterns and sender behavior that may elude human scrutiny.

Endpoint monitoring and zero-trust architecture also provide extra barriers against unauthorized system access.

For example, when ScreenConnect is installed, attackers secure administrator-level control that enables lateral movement across networks and additional secondary attacks. Zero-trust principles ensure even legitimate-looking system access requests are verified through multiple authentication factors before approval.

Most critically, regular security awareness training must evolve beyond standard phishing education to address specific vulnerabilities in collaboration tools.

The success of these attacks relies on employees voluntarily installing remote access software in response to seemingly valid technical requests.

Training programs should evolve with the latest intelligence to address tactics used in video conferencing spoofs, teach employees to verify unusual technical requests through alternative channels, and establish clear escalation procedures for suspicious meeting invitations or IT support requests.

Adapting to a New Threat Landscape

This campaign represents more than an isolated cybersecurity incident—it signals a fundamental shift in how cybercriminals approach corporate targets.

The pivot from breaking into systems to being willingly invited reflects a sophisticated grasp of workplace psychology and the trust that underpins remote UC collaboration.

The commoditization of cybercrime, as demonstrated by this attack, means organizations will face increasingly frequent and complex threats to their collaboration infrastructure.

Organizations must understand that the human element remains the most critical component of cybersecurity defense. While technological solutions are indispensable, the core vulnerability lies in the exploitation of human trust and urgency—challenges no software alone can eliminate.

Microsoft TeamsSecurity and ComplianceUC TrendsUCaaS

Brands mentioned in this article.

Featured

Share This Post