Remote Access Delivered Through Fake Zoom and Google Meet Calls
A campaign using fake Zoom and Google Meet pages to lure victims into fraudulent video calls has been identified. The attackers use these pages to deliver remote-access software. Multiple domains hosting identical fake meeting pages were discovered, with one domain previously linked to a ClickFix campaign. The fake interfaces show an active meeting with expected participants. When victims join, they are prompted to download a file disguised as a Zoom update. Various payloads were identified, including executables masquerading as meeting updates, MSI installers deploying legitimate remote support software, and commercial monitoring software configured for covert remote access. The campaign's goal appears to be establishing remote access using whichever tool is most effective.
AI Analysis
Technical Summary
This threat involves a sophisticated phishing campaign that impersonates popular video conferencing platforms Zoom and Google Meet by hosting fake meeting web pages on multiple malicious domains. These pages simulate active meetings with expected participants to lure victims into joining. Once a victim interacts with the fake meeting, they are prompted to download a file purportedly a Zoom update. The delivered payloads vary and include malicious executables disguised as legitimate meeting software updates, MSI installers that deploy legitimate remote support tools such as ConnectWise Control, and commercial monitoring software like Teramind configured for stealthy remote access. The attackers aim to establish persistent remote access to victim systems, enabling espionage, data theft, or further lateral movement. The campaign leverages social engineering techniques (T1566) and masquerades as trusted software updates (T1204) to bypass user caution. The use of legitimate remote support software complicates detection, as these tools are often whitelisted in enterprise environments. Multiple domains with similar naming conventions and URLs have been identified, some previously linked to the ClickFix campaign, indicating possible reuse of infrastructure or threat actor overlap. Although no CVE or known exploits in the wild are reported, the campaign's use of remote access tools and social engineering tactics presents a credible threat vector. The campaign is attributed to the adversary group Storm-1865. Indicators of compromise include specific file hashes and URLs/domains hosting the fake meeting pages. The campaign highlights the ongoing risk of phishing attacks exploiting remote work tools and the need for vigilance around software update prompts from unverified sources.
Potential Impact
Organizations worldwide face significant risks from this campaign, including unauthorized remote access, data exfiltration, espionage, and potential lateral movement within networks. The use of legitimate remote support software complicates detection and response, increasing dwell time and potential damage. Victims may suffer confidentiality breaches, operational disruption, and reputational harm. The campaign targets users of popular video conferencing platforms, which are ubiquitous in corporate, educational, and government sectors, expanding the potential victim pool. Successful compromise could enable attackers to deploy ransomware, steal intellectual property, or conduct prolonged surveillance. The social engineering aspect increases the likelihood of initial compromise, especially in environments with limited user awareness training or weak endpoint protections. The campaign also risks undermining trust in remote collaboration tools, which are critical for modern business continuity. Although no direct exploits or CVEs are involved, the threat's reliance on user interaction and deception means impact depends heavily on user vigilance and organizational controls.
Mitigation Recommendations
Organizations should implement multi-layered defenses beyond generic advice: 1) Deploy advanced email and web filtering to block access to known malicious domains and URLs associated with this campaign. 2) Enforce strict application whitelisting and endpoint protection policies that scrutinize unexpected software updates, especially those initiated outside official channels. 3) Educate users specifically about phishing campaigns impersonating video conferencing platforms and the risks of downloading updates from unverified sources. 4) Monitor network traffic for unusual remote access tool usage, including legitimate remote support software running outside approved maintenance windows or without proper authorization. 5) Employ threat intelligence feeds to update blocklists with identified malicious domains and file hashes promptly. 6) Use multi-factor authentication and session monitoring on remote access tools to detect and prevent unauthorized use. 7) Conduct regular audits of installed remote support and monitoring software to ensure only authorized instances exist. 8) Implement incident response playbooks tailored to remote access compromise scenarios to reduce dwell time. 9) Encourage users to verify software updates through official vendor channels and avoid clicking links in unsolicited messages. 10) Consider network segmentation to limit the impact of compromised endpoints and restrict remote access tool privileges to minimum necessary.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Japan, South Korea, Brazil
Indicators of Compromise
- hash: 2e754240b0f09cdacd2a1d73b2069bde
- hash: ad0a22e393e9289deac0d8d95d8118b5
- hash: d2c651efcb2258fed52949108a6e5a74
- hash: 39359ac4c6f23c26809f44526c37411bbfc68e2f
- hash: 44c459cd50ddf47a4885db86add6bae4da3c6f34
- hash: 7799089bdd10336c86268b33e0a6294c903d4c05
- hash: 1de8291997afa344fb21c83449b424f4d16978e0a8a866b7667754b88e72da00
- hash: 4af9b93dbb15a7da8120404bddf93028716673b15baca6338b533e7e8c232418
- hash: 644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa
- hash: 96c421a915873a51a14fcbdbad84f8608f0679b03855158fe0ab85a6228c10a2
- hash: ae8df1133d370407811292b9feaecb0b068ec12d14f0e237e13615e4048c63c0
- hash: ebb7f1c3f175c04e87fddce36f694ead62d89e16585a5d117e77b5f2abb13073
- url: http://uswebzoomus.com/zoom
- url: https://9googllemeett.live/
- url: https://9ooggleactivemeett.live/in/invite.php
- url: https://dhvault.com/
- url: https://goggllemmeettiingnc.com/meett/invite.php
- url: https://googlemeetme.us/
- url: https://greenwayauto.sale/
- url: https://zooom-cal-imvite-zoom-session.org/zoooommeeting/
- domain: 9googllemeett.live
- domain: 9ooggleactivemeett.live
- domain: dhvault.com
- domain: goggllemmeettiingnc.com
- domain: googlemeetme.us
- domain: greenwayauto.sale
- domain: us01web-zoom.us
- domain: uswebzoomus.com
- domain: zooom-cal-imvite-zoom-session.org
Remote Access Delivered Through Fake Zoom and Google Meet Calls
Description
A campaign using fake Zoom and Google Meet pages to lure victims into fraudulent video calls has been identified. The attackers use these pages to deliver remote-access software. Multiple domains hosting identical fake meeting pages were discovered, with one domain previously linked to a ClickFix campaign. The fake interfaces show an active meeting with expected participants. When victims join, they are prompted to download a file disguised as a Zoom update. Various payloads were identified, including executables masquerading as meeting updates, MSI installers deploying legitimate remote support software, and commercial monitoring software configured for covert remote access. The campaign's goal appears to be establishing remote access using whichever tool is most effective.
AI-Powered Analysis
Technical Analysis
This threat involves a sophisticated phishing campaign that impersonates popular video conferencing platforms Zoom and Google Meet by hosting fake meeting web pages on multiple malicious domains. These pages simulate active meetings with expected participants to lure victims into joining. Once a victim interacts with the fake meeting, they are prompted to download a file purportedly a Zoom update. The delivered payloads vary and include malicious executables disguised as legitimate meeting software updates, MSI installers that deploy legitimate remote support tools such as ConnectWise Control, and commercial monitoring software like Teramind configured for stealthy remote access. The attackers aim to establish persistent remote access to victim systems, enabling espionage, data theft, or further lateral movement. The campaign leverages social engineering techniques (T1566) and masquerades as trusted software updates (T1204) to bypass user caution. The use of legitimate remote support software complicates detection, as these tools are often whitelisted in enterprise environments. Multiple domains with similar naming conventions and URLs have been identified, some previously linked to the ClickFix campaign, indicating possible reuse of infrastructure or threat actor overlap. Although no CVE or known exploits in the wild are reported, the campaign's use of remote access tools and social engineering tactics presents a credible threat vector. The campaign is attributed to the adversary group Storm-1865. Indicators of compromise include specific file hashes and URLs/domains hosting the fake meeting pages. The campaign highlights the ongoing risk of phishing attacks exploiting remote work tools and the need for vigilance around software update prompts from unverified sources.
Potential Impact
Organizations worldwide face significant risks from this campaign, including unauthorized remote access, data exfiltration, espionage, and potential lateral movement within networks. The use of legitimate remote support software complicates detection and response, increasing dwell time and potential damage. Victims may suffer confidentiality breaches, operational disruption, and reputational harm. The campaign targets users of popular video conferencing platforms, which are ubiquitous in corporate, educational, and government sectors, expanding the potential victim pool. Successful compromise could enable attackers to deploy ransomware, steal intellectual property, or conduct prolonged surveillance. The social engineering aspect increases the likelihood of initial compromise, especially in environments with limited user awareness training or weak endpoint protections. The campaign also risks undermining trust in remote collaboration tools, which are critical for modern business continuity. Although no direct exploits or CVEs are involved, the threat's reliance on user interaction and deception means impact depends heavily on user vigilance and organizational controls.
Mitigation Recommendations
Organizations should implement multi-layered defenses beyond generic advice: 1) Deploy advanced email and web filtering to block access to known malicious domains and URLs associated with this campaign. 2) Enforce strict application whitelisting and endpoint protection policies that scrutinize unexpected software updates, especially those initiated outside official channels. 3) Educate users specifically about phishing campaigns impersonating video conferencing platforms and the risks of downloading updates from unverified sources. 4) Monitor network traffic for unusual remote access tool usage, including legitimate remote support software running outside approved maintenance windows or without proper authorization. 5) Employ threat intelligence feeds to update blocklists with identified malicious domains and file hashes promptly. 6) Use multi-factor authentication and session monitoring on remote access tools to detect and prevent unauthorized use. 7) Conduct regular audits of installed remote support and monitoring software to ensure only authorized instances exist. 8) Implement incident response playbooks tailored to remote access compromise scenarios to reduce dwell time. 9) Encourage users to verify software updates through official vendor channels and avoid clicking links in unsolicited messages. 10) Consider network segmentation to limit the impact of compromised endpoints and restrict remote access tool privileges to minimum necessary.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.netcraft.com/blog/remote-access-delivery-via-fake-meetings"]
- Adversary
- Storm-1865
- Pulse Id
- 69aaf10e623ea5265ee07c81
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash2e754240b0f09cdacd2a1d73b2069bde | — | |
hashad0a22e393e9289deac0d8d95d8118b5 | — | |
hashd2c651efcb2258fed52949108a6e5a74 | — | |
hash39359ac4c6f23c26809f44526c37411bbfc68e2f | — | |
hash44c459cd50ddf47a4885db86add6bae4da3c6f34 | — | |
hash7799089bdd10336c86268b33e0a6294c903d4c05 | — | |
hash1de8291997afa344fb21c83449b424f4d16978e0a8a866b7667754b88e72da00 | — | |
hash4af9b93dbb15a7da8120404bddf93028716673b15baca6338b533e7e8c232418 | — | |
hash644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa | — | |
hash96c421a915873a51a14fcbdbad84f8608f0679b03855158fe0ab85a6228c10a2 | — | |
hashae8df1133d370407811292b9feaecb0b068ec12d14f0e237e13615e4048c63c0 | — | |
hashebb7f1c3f175c04e87fddce36f694ead62d89e16585a5d117e77b5f2abb13073 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://uswebzoomus.com/zoom | — | |
urlhttps://9googllemeett.live/ | — | |
urlhttps://9ooggleactivemeett.live/in/invite.php | — | |
urlhttps://dhvault.com/ | — | |
urlhttps://goggllemmeettiingnc.com/meett/invite.php | — | |
urlhttps://googlemeetme.us/ | — | |
urlhttps://greenwayauto.sale/ | — | |
urlhttps://zooom-cal-imvite-zoom-session.org/zoooommeeting/ | — |
Domain
| Value | Description | Copy |
|---|---|---|
domain9googllemeett.live | — | |
domain9ooggleactivemeett.live | — | |
domaindhvault.com | — | |
domaingoggllemmeettiingnc.com | — | |
domaingooglemeetme.us | — | |
domaingreenwayauto.sale | — | |
domainus01web-zoom.us | — | |
domainuswebzoomus.com | — | |
domainzooom-cal-imvite-zoom-session.org | — |
Threat ID: 69ae9bba2904315ca3f470df
Added to database: 3/9/2026, 10:06:50 AM
Last enriched: 3/9/2026, 10:22:26 AM
Last updated: 3/14/2026, 12:39:16 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.