Deceptive Google Meet Invites Lure Users Into Malware Scams

Published

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

The reliance on virtual meetings has skyrocketed after the pandemic, making platforms like Google Meet and Zoom integral to our daily personal and professional communication. However, this surge in usage has also opened the door to a growing array of cybersecurity threats. One of the most concerning tactics currently on the rise is the ClickFix campaign — a sophisticated phishing scheme targeting unsuspecting Google Meet users.

These malware scams lure individuals with fake conference invitations designed to mimic legitimate meeting requests and exploit users’ trust. By understanding how these ClickFix campaigns operate and recognizing their warning signs, you can protect yourself and your organization from falling victim to this increasingly prevalent threat.

What Are ClickFix Campaigns?

ClickFix campaigns represent a new wave of phishing tactics that emerged in May 2024, aimed at exploiting users of popular software applications. Initially, these campaigns focused on impersonating errors related to well-known programs like Google Chrome, Microsoft Word, and OneDrive.

Cybercriminals employ social engineering techniques to trick you into believing you must resolve fictitious technical issues. By disguising their malicious intents as urgent fixes, these attackers have found a way to deceive even the most cautious users.

The hallmark of ClickFix campaigns is their clever use of social engineering.

  • Scammers craft messages that appear to originate from legitimate sources, often claiming that you need to address critical errors in their applications.
  • These messages can range from vague prompts to elaborate narratives about connectivity issues or software failures.
  • You are then guided to execute PowerShell code designed to “fix” the supposed problem, unwittingly allowing malware to infiltrate their systems.

The Anatomy of a ClickFix Attack

The ClickFix campaign takes advantage of the wide adoption of Google Meet, sending fake meeting invitations that closely resemble legitimate Google Meet links. These fraudulent invitations often appear to come from trusted sources, enticing users with promises of important work meetings or conferences.

You may encounter URLs that look almost identical to official Google Meet links, such as:

  • meet[.]google[.]us-join[.]com
  • meet[.]googie[.]com-join[.]us
  • meet[.]google[.]com-join[.]us
  • meet[.]google[.]web-join[.]com
  • meet[.]google[.]webjoining[.]com
  • meet[.]google[.]cdm-join[.]us
  • meet[.]google[.]us07host[.]com
  • Googiedrivers[.]com
  • hxxps://meet[.]google[.]com-join[.]us/wmq-qcdn-orj
  • hxxps://meet[.]google[.]us-join[.]com/ywk-batf-sfh
  • hxxps://meet[.]google[.]us07host[.]com/coc-btru-ays
  • hxxps://meet[.]google[.]webjoining[.]com/exw-jfaj-hpa

This careful replication of legitimate URLs is a key tactic scammers use to lower users’ defenses, making them more likely to click without verifying the source.

The Infection Process

Once you click on the fraudulent link, you are directed to a fake Google Meet page, where you may be greeted with a pop-up message claiming there is a technical issue — often related to your microphone or headset. 

When you click on the “Try Fix” button, you are guided through a deceptive process involving copying a piece of PowerShell code. The code is presented as a necessary step to resolve the supposed issue, but instead, it opens the door for malware installation. By pasting the code into the Windows Command Prompt, you unknowingly execute commands that download malicious software onto your system.

Types of Malware Delivered

The ClickFix campaigns are not just a nuisance; they can lead to severe security breaches. The malware deployed through these attacks includes a variety of malicious software, such as:

  • DarkGate: A versatile remote access trojan (RAT) that allows attackers to gain control of infected systems.
  • AMOS stealer: Specifically targets macOS systems, stealing sensitive data and credentials.
  • Lumma stealer: Designed to harvest personal information and sensitive data from infected devices.
  • Matanbuchus and XMRig: Used for cryptocurrency mining, these malware strains can slow down systems while surreptitiously utilizing computing resources.

Recent Trends and Evolution

Recent reports from cybersecurity firms, including McAfee and Sekoia, indicate a significant uptick in ClickFix campaigns, particularly in regions like the United States and Japan. The convenience of digital communication and the increased volume of meetings have made it easier for phishing attempts to slip through the cracks.

  • Cybercriminals are not resting on their laurels; they are continuously adapting their strategies to remain effective. 
  • The ClickFix campaigns have diversified their tactics, expanding beyond Google Meet to include other platforms like Zoom, and targeting users of various popular applications and services.
  • Recent campaigns have been reported to involve phishing emails targeting transport and logistics firms, showcasing the attackers’ efforts to tailor their approaches to different industries.

Additionally, two notable threat actor groups — Slavic Nation Empire (SNE) and Scamquerteo — have been linked to these campaigns. These groups are considered sub-teams of larger cryptocurrency scam networks, highlighting the organized and systematic nature of these phishing attacks.

Protecting Yourself From ClickFix Attacks

Awareness is the first line of defense against phishing scams like ClickFix. Here are some tips to help you identify potential phishing attempts:

  • Scrutinize email addresses: Always check the sender’s email address for inconsistencies. Legitimate organizations typically use official domains. If something looks off, it’s worth investigating further.
  • Examine links carefully: Hover over links to reveal the actual URL before clicking. Avoid clicking if the link seems suspicious or does not match the expected domain (e.g., a slight misspelling).
  • Look for red flags: Pay attention to urgent language or unusual requests, such as prompting you to resolve technical issues or execute commands. Legitimate companies rarely ask users to run scripts or share sensitive information via email.

Implementing Security Measures

Taking proactive steps can significantly reduce your risk of falling victim to ClickFix attacks:

  • Use updated security software: Ensure your antivirus and anti-malware programs are up-to-date. These tools can help detect and block malicious activities before compromising your system.
  • Enable multi-factor authentication (MFA): Implementing MFA adds layer of security to your accounts. Even if your credentials are compromised, attackers will face an extra hurdle in accessing your accounts.
  • Regularly back up your data: Frequent backups can safeguard your information against ransomware attacks and malware infections. In an attack, you can restore your system without losing critical files.

Best Practices for Virtual Meetings

To ensure a safer virtual meeting experience, follow these best practices:

  • Verify meeting invitations: Only use links from trusted sources or known contacts. If you receive a meeting invitation unexpectedly, confirm it with the sender through a different communication method before joining.
  • Adjust security settings: Use the security features provided by your video conferencing platform. Options like waiting rooms and password-protected meetings can help prevent unauthorized access.
  • Educate your team: If you’re part of an organization, conduct regular cybersecurity training sessions to keep employees informed about the latest phishing tactics and encourage a culture of cybersecurity awareness.

Protect yourself by choosing a reliable anti-malware solution that fits your needs. Investing in quality anti-malware can provide essential safeguards against these types of threats and help keep your devices secure.

Sunny Yadav Avatar

Subscribe to Cybersecurity Insider

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.

This field is required This field is required

Get the free Cybersecurity newsletter

Strengthen your organization’s IT security defenses with the latest news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

This field is required This field is required