Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Attackers Weaponize RMM Tools via Zoom, Meet, & Teams Lures

0
Medium
Published: Fri Feb 13 2026 (02/13/2026, 09:23:27 UTC)
Source: AlienVault OTX General

Description

Netskope Threat Labs has identified multiple phishing campaigns exploiting video conference invitations from Zoom, Microsoft Teams, and Google Meet. The attackers use fake meeting invites to trick users into downloading malicious payloads disguised as software updates. These payloads are actually legitimate, digitally signed remote monitoring and management (RMM) tools like Datto RMM, LogMeIn, or ScreenConnect. By leveraging these tools, attackers gain administrative remote access to victims' machines, potentially leading to data theft or further malware deployment. The campaigns use convincing phishing pages that mimic legitimate video conferencing platforms, exploiting users' urgency to join scheduled calls. This sophisticated approach allows attackers to bypass traditional security measures and establish a persistent foothold in corporate networks.

AI-Powered Analysis

AILast updated: 02/13/2026, 13:03:38 UTC

Technical Analysis

This threat involves sophisticated phishing campaigns identified by Netskope Threat Labs that exploit popular video conferencing platforms—Zoom, Microsoft Teams, and Google Meet—to lure victims into downloading malicious payloads. The attackers send fake meeting invitations that appear legitimate, prompting users to download what looks like software updates. However, these payloads are actually legitimate remote monitoring and management (RMM) tools such as Datto RMM, LogMeIn, and ScreenConnect, which are digitally signed and trusted by many organizations. By deploying these RMM tools, attackers gain administrative-level remote access to compromised machines, enabling them to conduct data exfiltration, deploy additional malware, or move laterally within corporate networks. The use of legitimate signed software helps attackers evade traditional security controls like antivirus and endpoint detection systems. The phishing pages are carefully crafted to mimic authentic video conferencing interfaces, exploiting the urgency and trust users place in meeting invites. This social engineering tactic combined with the abuse of trusted RMM tools represents a significant escalation in attack sophistication. The campaigns do not require zero-day exploits but rely heavily on user interaction and deception. No known exploits in the wild have been reported beyond these phishing campaigns. The threat is medium severity due to the potential for administrative access and persistence but requires user action to succeed.

Potential Impact

For European organizations, this threat poses a substantial risk due to widespread reliance on video conferencing tools and remote management software, especially in the post-pandemic remote work environment. Successful compromise can lead to unauthorized administrative access, enabling attackers to steal sensitive corporate data, intellectual property, or personal information protected under GDPR. It can also facilitate deployment of ransomware or other malware, disrupting business operations and causing financial and reputational damage. The use of legitimate signed RMM tools complicates detection and response, potentially allowing attackers to maintain long-term persistence. Organizations with less mature security awareness programs or insufficient endpoint controls are particularly vulnerable. The threat could impact sectors with high remote collaboration needs such as finance, healthcare, technology, and government agencies. Additionally, regulatory implications of data breaches under European privacy laws could amplify the consequences. The phishing nature of the attack means that user training and vigilance are critical to reducing impact.

Mitigation Recommendations

1. Implement strict application whitelisting and control policies to restrict installation and execution of RMM tools only to authorized personnel and systems. 2. Enhance user awareness training focused on recognizing phishing attempts, especially those involving video conferencing invites and urgent download requests. 3. Deploy advanced email filtering and URL reputation services to detect and block phishing URLs mimicking conferencing platforms. 4. Monitor and audit RMM tool usage and remote sessions for unusual activity or unauthorized access patterns. 5. Enforce multi-factor authentication (MFA) for remote access tools and administrative accounts to limit attacker lateral movement. 6. Use endpoint detection and response (EDR) solutions capable of identifying anomalous behavior even from signed software. 7. Maintain up-to-date threat intelligence feeds to quickly identify and block known malicious URLs associated with these campaigns. 8. Encourage users to verify meeting invites through secondary channels before downloading any software updates. 9. Segment networks to limit the scope of access granted via RMM tools and contain potential breaches. 10. Regularly review and update incident response plans to address scenarios involving compromised remote management tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.netskope.com/blog/attackers-weaponize-signed-rmm-tools-via-zoom-meet-teams-lures"]
Adversary
null
Pulse Id
698eed8fcb4bdfed81d88a45
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://spinalpaca.com/dropboxdocument/Windows/invite.php
urlhttps://doyu.digital/us05Zoom4JqpH8/Windows/invite.php
urlhttps://lankystocks.com/Zoom/Windows/invite.php
urlhttps://teams.manitosdemailen.cl/Interview/peer/invite.php
urlhttps://us05meeting.ws/G/MEET/googlemeet-invite.php
urlhttps://viewmyparty.com/Windows/invite.php
urlhttps://web04zoom.im.web04zoomp.us/Windows/invite.php
urlhttps://zoom-meets.us/invite.php
urlhttps://zoominvitemeetingsetup.vip.zoommeetingsetup.info/Windows/invite.php
urlhttps://zoommeetingapplicant.com/Zoom/Windows/invite.php
urlhttps://zoommeetingsapplicantinvite.com/Windows/invite.php
urlhttps://zoommeetingsinvitees.com/Windows/invite.php

Threat ID: 698f1dccc9e1ff5ad82c8dfc

Added to database: 2/13/2026, 12:49:16 PM

Last enriched: 2/13/2026, 1:03:38 PM

Last updated: 2/20/2026, 10:43:09 PM

Views: 275

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats