An ongoing wave of phishing campaigns exploiting pretend assembly invitations from in style video conferencing platforms, together with Zoom, Microsoft Groups, and Google Meet.
The assaults use social engineering to lure company customers into downloading malicious “software program updates,” that are, in actuality, digitally signed distant monitoring and administration (RMM) instruments that grant attackers full distant entry to victims’ programs.
These phishing operations depend on trusted collaboration platforms which have change into indispensable in hybrid and distant work environments.
The attackers impersonate company communication channels by distributing convincing e mail invitations that mimic legit assembly notifications.
Recipients are prompted to affix a gathering or confirm an invitation by way of misleading hyperlinks hosted on typo-squatted domains reminiscent of zoom-meet.us or teams-updates.internet, which intently resemble legit company companies.
Upon clicking the pretend hyperlink, victims are redirected to a extremely convincing phishing web page resembling the genuine login or assembly display of platforms like Google Meet, Microsoft Groups, or Zoom.
To extend credibility, the phishing pages intently mimic legit pages, typically displaying lists of contributors who’ve “joined” the decision.
To bolster legitimacy, these pages might show simulated participant lists and energetic assembly interfaces, creating a way of urgency to “be part of instantly.”
Netskope researchers noticed that these interactive decoys encourage victims to behave rapidly with out verifying the authenticity of the web page.
The Hook: The “Necessary Replace” Lure
As customers try to affix the pretend assembly, they’re prompted with a warning that their conferencing software is outdated or incompatible.
A pop-up instructs them to obtain and set up a “important replace” earlier than becoming a member of. This pretend replace is the assault vector an executable masquerading as a legit software program patch.

The attackers exploit enterprise urgency and worry of lacking necessary conferences, main customers to bypass typical safety warning.
In some circumstances, the phishing websites even embody on-screen set up directions or progress bars to keep up credibility, guiding victims by way of the setup means of the pretend replace in a way in step with legit conferencing instruments.
As soon as executed, the downloaded file installs a legit RMM agent reminiscent of Datto RMM, LogMeIn, or ScreenConnect. Some phishing websites even present steps on how one can “set up” the software program replace.

These instruments, typically pre-approved in enterprise environments, permit distant management, file entry, and system administration. As a result of they’re digitally signed and bonafide, they’ll simply evade antivirus detections and endpoint safety controls.
Ongoing Risk and Protection Measures
RMM platforms to remotely entry compromised programs, steal company knowledge, transfer laterally, and in extreme circumstances, deploy further payloads reminiscent of ransomware.
The usage of legit, trusted software program minimizes the prospect of detection and gives persistent administrative entry with out triggering conventional menace detection mechanisms.
Netskope Risk Labs warns that these campaigns spotlight how attackers proceed to take advantage of belief in collaboration instruments and distant entry software program.
Organizations are suggested to observe using RMM instruments throughout their networks, limit administrative privileges, and educate staff about pretend replace prompts.
IT groups ought to validate that video conferencing updates come solely from official vendor domains and are distributed through safe inner channels.
Observe us on Google Information, LinkedIn, and X to Get Prompt Updates and Set GBH as a Most well-liked Supply in Google.
