Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Remote Access Delivered Through Fake Zoom and Google Meet Calls

0
Medium
Published: Fri Mar 06 2026 (03/06/2026, 15:21:50 UTC)
Source: AlienVault OTX General

Description

A campaign using fake Zoom and Google Meet pages to lure victims into fraudulent video calls has been identified. The attackers use these pages to deliver remote-access software. Multiple domains hosting identical fake meeting pages were discovered, with one domain previously linked to a ClickFix campaign. The fake interfaces show an active meeting with expected participants. When victims join, they are prompted to download a file disguised as a Zoom update. Various payloads were identified, including executables masquerading as meeting updates, MSI installers deploying legitimate remote support software, and commercial monitoring software configured for covert remote access. The campaign's goal appears to be establishing remote access using whichever tool is most effective.

AI-Powered Analysis

AILast updated: 03/09/2026, 10:22:26 UTC

Technical Analysis

This threat involves a sophisticated phishing campaign that impersonates popular video conferencing platforms Zoom and Google Meet by hosting fake meeting web pages on multiple malicious domains. These pages simulate active meetings with expected participants to lure victims into joining. Once a victim interacts with the fake meeting, they are prompted to download a file purportedly a Zoom update. The delivered payloads vary and include malicious executables disguised as legitimate meeting software updates, MSI installers that deploy legitimate remote support tools such as ConnectWise Control, and commercial monitoring software like Teramind configured for stealthy remote access. The attackers aim to establish persistent remote access to victim systems, enabling espionage, data theft, or further lateral movement. The campaign leverages social engineering techniques (T1566) and masquerades as trusted software updates (T1204) to bypass user caution. The use of legitimate remote support software complicates detection, as these tools are often whitelisted in enterprise environments. Multiple domains with similar naming conventions and URLs have been identified, some previously linked to the ClickFix campaign, indicating possible reuse of infrastructure or threat actor overlap. Although no CVE or known exploits in the wild are reported, the campaign's use of remote access tools and social engineering tactics presents a credible threat vector. The campaign is attributed to the adversary group Storm-1865. Indicators of compromise include specific file hashes and URLs/domains hosting the fake meeting pages. The campaign highlights the ongoing risk of phishing attacks exploiting remote work tools and the need for vigilance around software update prompts from unverified sources.

Potential Impact

Organizations worldwide face significant risks from this campaign, including unauthorized remote access, data exfiltration, espionage, and potential lateral movement within networks. The use of legitimate remote support software complicates detection and response, increasing dwell time and potential damage. Victims may suffer confidentiality breaches, operational disruption, and reputational harm. The campaign targets users of popular video conferencing platforms, which are ubiquitous in corporate, educational, and government sectors, expanding the potential victim pool. Successful compromise could enable attackers to deploy ransomware, steal intellectual property, or conduct prolonged surveillance. The social engineering aspect increases the likelihood of initial compromise, especially in environments with limited user awareness training or weak endpoint protections. The campaign also risks undermining trust in remote collaboration tools, which are critical for modern business continuity. Although no direct exploits or CVEs are involved, the threat's reliance on user interaction and deception means impact depends heavily on user vigilance and organizational controls.

Mitigation Recommendations

Organizations should implement multi-layered defenses beyond generic advice: 1) Deploy advanced email and web filtering to block access to known malicious domains and URLs associated with this campaign. 2) Enforce strict application whitelisting and endpoint protection policies that scrutinize unexpected software updates, especially those initiated outside official channels. 3) Educate users specifically about phishing campaigns impersonating video conferencing platforms and the risks of downloading updates from unverified sources. 4) Monitor network traffic for unusual remote access tool usage, including legitimate remote support software running outside approved maintenance windows or without proper authorization. 5) Employ threat intelligence feeds to update blocklists with identified malicious domains and file hashes promptly. 6) Use multi-factor authentication and session monitoring on remote access tools to detect and prevent unauthorized use. 7) Conduct regular audits of installed remote support and monitoring software to ensure only authorized instances exist. 8) Implement incident response playbooks tailored to remote access compromise scenarios to reduce dwell time. 9) Encourage users to verify software updates through official vendor channels and avoid clicking links in unsolicited messages. 10) Consider network segmentation to limit the impact of compromised endpoints and restrict remote access tool privileges to minimum necessary.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.netcraft.com/blog/remote-access-delivery-via-fake-meetings"]
Adversary
Storm-1865
Pulse Id
69aaf10e623ea5265ee07c81
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash2e754240b0f09cdacd2a1d73b2069bde
hashad0a22e393e9289deac0d8d95d8118b5
hashd2c651efcb2258fed52949108a6e5a74
hash39359ac4c6f23c26809f44526c37411bbfc68e2f
hash44c459cd50ddf47a4885db86add6bae4da3c6f34
hash7799089bdd10336c86268b33e0a6294c903d4c05
hash1de8291997afa344fb21c83449b424f4d16978e0a8a866b7667754b88e72da00
hash4af9b93dbb15a7da8120404bddf93028716673b15baca6338b533e7e8c232418
hash644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa
hash96c421a915873a51a14fcbdbad84f8608f0679b03855158fe0ab85a6228c10a2
hashae8df1133d370407811292b9feaecb0b068ec12d14f0e237e13615e4048c63c0
hashebb7f1c3f175c04e87fddce36f694ead62d89e16585a5d117e77b5f2abb13073

Url

ValueDescriptionCopy
urlhttp://uswebzoomus.com/zoom
urlhttps://9googllemeett.live/
urlhttps://9ooggleactivemeett.live/in/invite.php
urlhttps://dhvault.com/
urlhttps://goggllemmeettiingnc.com/meett/invite.php
urlhttps://googlemeetme.us/
urlhttps://greenwayauto.sale/
urlhttps://zooom-cal-imvite-zoom-session.org/zoooommeeting/

Domain

ValueDescriptionCopy
domain9googllemeett.live
domain9ooggleactivemeett.live
domaindhvault.com
domaingoggllemmeettiingnc.com
domaingooglemeetme.us
domaingreenwayauto.sale
domainus01web-zoom.us
domainuswebzoomus.com
domainzooom-cal-imvite-zoom-session.org

Threat ID: 69ae9bba2904315ca3f470df

Added to database: 3/9/2026, 10:06:50 AM

Last enriched: 3/9/2026, 10:22:26 AM

Last updated: 3/14/2026, 12:39:16 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses