Attackers Weaponize RMM Tools via Zoom, Meet, & Teams Lures
Netskope Threat Labs has identified multiple phishing campaigns exploiting video conference invitations from Zoom, Microsoft Teams, and Google Meet. The attackers use fake meeting invites to trick users into downloading malicious payloads disguised as software updates. These payloads are actually legitimate, digitally signed remote monitoring and management (RMM) tools like Datto RMM, LogMeIn, or ScreenConnect. By leveraging these tools, attackers gain administrative remote access to victims' machines, potentially leading to data theft or further malware deployment. The campaigns use convincing phishing pages that mimic legitimate video conferencing platforms, exploiting users' urgency to join scheduled calls. This sophisticated approach allows attackers to bypass traditional security measures and establish a persistent foothold in corporate networks.
AI Analysis
Technical Summary
This threat involves sophisticated phishing campaigns identified by Netskope Threat Labs that exploit popular video conferencing platforms—Zoom, Microsoft Teams, and Google Meet—to lure victims into downloading malicious payloads. The attackers send fake meeting invitations that appear legitimate, prompting users to download what looks like software updates. However, these payloads are actually legitimate remote monitoring and management (RMM) tools such as Datto RMM, LogMeIn, and ScreenConnect, which are digitally signed and trusted by many organizations. By deploying these RMM tools, attackers gain administrative-level remote access to compromised machines, enabling them to conduct data exfiltration, deploy additional malware, or move laterally within corporate networks. The use of legitimate signed software helps attackers evade traditional security controls like antivirus and endpoint detection systems. The phishing pages are carefully crafted to mimic authentic video conferencing interfaces, exploiting the urgency and trust users place in meeting invites. This social engineering tactic combined with the abuse of trusted RMM tools represents a significant escalation in attack sophistication. The campaigns do not require zero-day exploits but rely heavily on user interaction and deception. No known exploits in the wild have been reported beyond these phishing campaigns. The threat is medium severity due to the potential for administrative access and persistence but requires user action to succeed.
Potential Impact
For European organizations, this threat poses a substantial risk due to widespread reliance on video conferencing tools and remote management software, especially in the post-pandemic remote work environment. Successful compromise can lead to unauthorized administrative access, enabling attackers to steal sensitive corporate data, intellectual property, or personal information protected under GDPR. It can also facilitate deployment of ransomware or other malware, disrupting business operations and causing financial and reputational damage. The use of legitimate signed RMM tools complicates detection and response, potentially allowing attackers to maintain long-term persistence. Organizations with less mature security awareness programs or insufficient endpoint controls are particularly vulnerable. The threat could impact sectors with high remote collaboration needs such as finance, healthcare, technology, and government agencies. Additionally, regulatory implications of data breaches under European privacy laws could amplify the consequences. The phishing nature of the attack means that user training and vigilance are critical to reducing impact.
Mitigation Recommendations
1. Implement strict application whitelisting and control policies to restrict installation and execution of RMM tools only to authorized personnel and systems. 2. Enhance user awareness training focused on recognizing phishing attempts, especially those involving video conferencing invites and urgent download requests. 3. Deploy advanced email filtering and URL reputation services to detect and block phishing URLs mimicking conferencing platforms. 4. Monitor and audit RMM tool usage and remote sessions for unusual activity or unauthorized access patterns. 5. Enforce multi-factor authentication (MFA) for remote access tools and administrative accounts to limit attacker lateral movement. 6. Use endpoint detection and response (EDR) solutions capable of identifying anomalous behavior even from signed software. 7. Maintain up-to-date threat intelligence feeds to quickly identify and block known malicious URLs associated with these campaigns. 8. Encourage users to verify meeting invites through secondary channels before downloading any software updates. 9. Segment networks to limit the scope of access granted via RMM tools and contain potential breaches. 10. Regularly review and update incident response plans to address scenarios involving compromised remote management tools.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Italy, Spain
Indicators of Compromise
- url: https://spinalpaca.com/dropboxdocument/Windows/invite.php
- url: https://doyu.digital/us05Zoom4JqpH8/Windows/invite.php
- url: https://lankystocks.com/Zoom/Windows/invite.php
- url: https://teams.manitosdemailen.cl/Interview/peer/invite.php
- url: https://us05meeting.ws/G/MEET/googlemeet-invite.php
- url: https://viewmyparty.com/Windows/invite.php
- url: https://web04zoom.im.web04zoomp.us/Windows/invite.php
- url: https://zoom-meets.us/invite.php
- url: https://zoominvitemeetingsetup.vip.zoommeetingsetup.info/Windows/invite.php
- url: https://zoommeetingapplicant.com/Zoom/Windows/invite.php
- url: https://zoommeetingsapplicantinvite.com/Windows/invite.php
- url: https://zoommeetingsinvitees.com/Windows/invite.php
Attackers Weaponize RMM Tools via Zoom, Meet, & Teams Lures
Description
Netskope Threat Labs has identified multiple phishing campaigns exploiting video conference invitations from Zoom, Microsoft Teams, and Google Meet. The attackers use fake meeting invites to trick users into downloading malicious payloads disguised as software updates. These payloads are actually legitimate, digitally signed remote monitoring and management (RMM) tools like Datto RMM, LogMeIn, or ScreenConnect. By leveraging these tools, attackers gain administrative remote access to victims' machines, potentially leading to data theft or further malware deployment. The campaigns use convincing phishing pages that mimic legitimate video conferencing platforms, exploiting users' urgency to join scheduled calls. This sophisticated approach allows attackers to bypass traditional security measures and establish a persistent foothold in corporate networks.
AI-Powered Analysis
Technical Analysis
This threat involves sophisticated phishing campaigns identified by Netskope Threat Labs that exploit popular video conferencing platforms—Zoom, Microsoft Teams, and Google Meet—to lure victims into downloading malicious payloads. The attackers send fake meeting invitations that appear legitimate, prompting users to download what looks like software updates. However, these payloads are actually legitimate remote monitoring and management (RMM) tools such as Datto RMM, LogMeIn, and ScreenConnect, which are digitally signed and trusted by many organizations. By deploying these RMM tools, attackers gain administrative-level remote access to compromised machines, enabling them to conduct data exfiltration, deploy additional malware, or move laterally within corporate networks. The use of legitimate signed software helps attackers evade traditional security controls like antivirus and endpoint detection systems. The phishing pages are carefully crafted to mimic authentic video conferencing interfaces, exploiting the urgency and trust users place in meeting invites. This social engineering tactic combined with the abuse of trusted RMM tools represents a significant escalation in attack sophistication. The campaigns do not require zero-day exploits but rely heavily on user interaction and deception. No known exploits in the wild have been reported beyond these phishing campaigns. The threat is medium severity due to the potential for administrative access and persistence but requires user action to succeed.
Potential Impact
For European organizations, this threat poses a substantial risk due to widespread reliance on video conferencing tools and remote management software, especially in the post-pandemic remote work environment. Successful compromise can lead to unauthorized administrative access, enabling attackers to steal sensitive corporate data, intellectual property, or personal information protected under GDPR. It can also facilitate deployment of ransomware or other malware, disrupting business operations and causing financial and reputational damage. The use of legitimate signed RMM tools complicates detection and response, potentially allowing attackers to maintain long-term persistence. Organizations with less mature security awareness programs or insufficient endpoint controls are particularly vulnerable. The threat could impact sectors with high remote collaboration needs such as finance, healthcare, technology, and government agencies. Additionally, regulatory implications of data breaches under European privacy laws could amplify the consequences. The phishing nature of the attack means that user training and vigilance are critical to reducing impact.
Mitigation Recommendations
1. Implement strict application whitelisting and control policies to restrict installation and execution of RMM tools only to authorized personnel and systems. 2. Enhance user awareness training focused on recognizing phishing attempts, especially those involving video conferencing invites and urgent download requests. 3. Deploy advanced email filtering and URL reputation services to detect and block phishing URLs mimicking conferencing platforms. 4. Monitor and audit RMM tool usage and remote sessions for unusual activity or unauthorized access patterns. 5. Enforce multi-factor authentication (MFA) for remote access tools and administrative accounts to limit attacker lateral movement. 6. Use endpoint detection and response (EDR) solutions capable of identifying anomalous behavior even from signed software. 7. Maintain up-to-date threat intelligence feeds to quickly identify and block known malicious URLs associated with these campaigns. 8. Encourage users to verify meeting invites through secondary channels before downloading any software updates. 9. Segment networks to limit the scope of access granted via RMM tools and contain potential breaches. 10. Regularly review and update incident response plans to address scenarios involving compromised remote management tools.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.netskope.com/blog/attackers-weaponize-signed-rmm-tools-via-zoom-meet-teams-lures"]
- Adversary
- null
- Pulse Id
- 698eed8fcb4bdfed81d88a45
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://spinalpaca.com/dropboxdocument/Windows/invite.php | — | |
urlhttps://doyu.digital/us05Zoom4JqpH8/Windows/invite.php | — | |
urlhttps://lankystocks.com/Zoom/Windows/invite.php | — | |
urlhttps://teams.manitosdemailen.cl/Interview/peer/invite.php | — | |
urlhttps://us05meeting.ws/G/MEET/googlemeet-invite.php | — | |
urlhttps://viewmyparty.com/Windows/invite.php | — | |
urlhttps://web04zoom.im.web04zoomp.us/Windows/invite.php | — | |
urlhttps://zoom-meets.us/invite.php | — | |
urlhttps://zoominvitemeetingsetup.vip.zoommeetingsetup.info/Windows/invite.php | — | |
urlhttps://zoommeetingapplicant.com/Zoom/Windows/invite.php | — | |
urlhttps://zoommeetingsapplicantinvite.com/Windows/invite.php | — | |
urlhttps://zoommeetingsinvitees.com/Windows/invite.php | — |
Threat ID: 698f1dccc9e1ff5ad82c8dfc
Added to database: 2/13/2026, 12:49:16 PM
Last enriched: 2/13/2026, 1:03:38 PM
Last updated: 2/20/2026, 10:43:09 PM
Views: 275
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
MediumAndroid threats using GenAI usher in a new era
MediumMaltrail IOC for 2026-02-20
MediumFBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025
MediumPromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.