Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Google Meet Page Used To Deliver Malware

December 1, 2025
Reading Time: 3 mins read
in Alerts
Albiriox Malware Hits Hundreds Of Apps

A sophisticated malware campaign is targeting remote workers and organizations by impersonating a Google Meet landing page on the deceptive domain gogl-meet[.]com. The attack employs a social engineering technique known as ClickFix to circumvent standard browser security features and install a Remote Access Trojan (RAT) onto the victim’s system. The initial stage of the attack involves a user navigating to the fraudulent site, which is visually identical to the legitimate Google Meet interface.

Instead of displaying a video feed, the user is presented with a pop-up error message, typically titled “Can’t join the meeting,” which claims there’s an issue with the camera or microphone. Unlike traditional phishing that seeks login credentials, this page offers a false technical “fix” that demands specific, physical user interaction. The victim is instructed to perform a sequence of keystrokes: press Windows key + R, then CTRL + V, and finally Enter.

Crucially, the user clicking the “Join now” or “Fix” button on the fake page initiates a JavaScript function that silently copies a malicious PowerShell script to their clipboard. By then following the provided manual keystroke instructions, the victim unknowingly pastes and executes this script via the Windows Run dialog. This technique is highly effective as it leverages the user’s manual action to bypass typical browser-based security filters, such as Google Safe Browsing and SmartScreen.

Forensic investigations of systems infected through gogl-meet[.]com confirmed a direct path leading to a RAT infection. Analysis of the Master File Table (MFT) provided critical evidence: the MFT entry for the dropped payload contained essential origin data in its Alternative Data Stream (ADS). This artifact linked the execution of the RAT back to the ClickFix downloaded file and the referrer URL, definitively tying the malware to the browser-based social engineering event rather than a standard email attachment or drive-by download.

A notable feature of this malware wave is the obfuscation used within the PowerShell payload. Threat actors are padding the malicious script with extensive comments containing trusted Unicode visual symbols, such as repeated green check marks (✅). This tactic is designed to visually reassure the victim, as these symbols may be the only text visible in the small Windows Run box, suggesting the command is “verified.” Technically, the padding also pushes the actual malicious code, often an IEX download cradle, out of the immediate visible area of the dialog box, effectively masking the script’s true intent from a quick glance. This latest iteration, simulating a Google Meet glitch, demonstrates a shift toward targeting corporate environments where video conferencing friction is a common, and therefore trusted, occurrence.

Reference:

  • Weaponized Google Meet Page Uses ClickFix Technique To Deliver Malicious Payload
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityDecember 2025
ADVERTISEMENT

Related Posts

Tomiris Shifts To Public Service C2

Tomiris Shifts To Public Service C2

December 1, 2025
Albiriox Malware Hits Hundreds Of Apps

Albiriox Malware Hits Hundreds Of Apps

December 1, 2025
ShadowV2 Botnet Tests During AWS Outage

Bloody Wolf Widens Java RAT Campaign

November 28, 2025
ShadowV2 Botnet Tests During AWS Outage

Forge Library Patch Stops Signature Bypass

November 28, 2025
ShadowV2 Botnet Tests During AWS Outage

ShadowV2 Botnet Tests During AWS Outage

November 28, 2025
ASUS Flags Critical AiCloud Router Flaw

Toddycat Tools Steal Outlook And M365 Data

November 27, 2025

Latest Alerts

Google Meet Page Used To Deliver Malware

Tomiris Shifts To Public Service C2

Albiriox Malware Hits Hundreds Of Apps

Bloody Wolf Widens Java RAT Campaign

Forge Library Patch Stops Signature Bypass

ShadowV2 Botnet Tests During AWS Outage

Subscribe to our newsletter

    Latest Incidents

    Ecommerce Breach Exposes 34 Million

    Ransomware Hits Golf Manor Network

    Yearn Finance Hit By 9M Token Exploit

    Mazda Reports No Impact From Oracle Hack

    Asahi Breach Hits Two Million Users

    Qilin Ransomware Hits Korean MSP

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial