Cybercriminals Exploit Fake Google Meet Pages to Deploy Infostealing Malware

In a sophisticated cyberattack campaign known as ClickFix, threat actors are leveraging counterfeit Google Meet pages to deceive users into executing malicious PowerShell commands, resulting in the installation of information-stealing malware on both Windows and macOS systems. This method represents a significant evolution in phishing tactics, emphasizing social engineering to bypass traditional security measures.

The ClickFix Campaign: An Overview

The ClickFix campaign emerged in May 2024, initially identified by cybersecurity firm Proofpoint. Early iterations involved fake error messages for applications like Google Chrome, Microsoft Word, and OneDrive, prompting users to run PowerShell commands to resolve non-existent issues. These commands facilitated the installation of various malware strains, including DarkGate, Matanbuchus, NetSupport, Amadey Loader, XMRig, and Lumma Stealer. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/?utm_source=openai))

By October 2024, the campaign had evolved to target Google Meet users specifically. Cybercriminals began sending phishing emails that closely resembled legitimate Google Meet invitations, complete with meeting details and links. The URLs used in these emails were crafted to mimic authentic Google Meet addresses, employing slight variations to deceive recipients. Examples include:

– meet[.]google[.]us-join[.]com

– meet[.]google[.]web-join[.]com

– meet[.]googie[.]com-join[.]us

– meet[.]google[.]cdm-join[.]us

Upon clicking these deceptive links, users are directed to fraudulent Google Meet pages that display convincing error messages, such as Microphone Permission Denied. These messages prompt users to click a Try Fix button, initiating the ClickFix infection process. This process involves copying a malicious PowerShell command to the user’s clipboard and instructing them to execute it in the Windows Command Prompt, under the guise of resolving the purported issue. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/?utm_source=openai))

The Infection Process: A Closer Look

The attack begins with the user receiving a phishing email that appears to be a legitimate Google Meet invitation. The email contains a link that, when clicked, directs the user to a counterfeit Google Meet page. This page is meticulously designed to replicate the authentic interface, making it challenging for users to identify the deception.

Once on the fake page, a pop-up error message appears, claiming a technical issue with the user’s microphone or headset. The message urges the user to click on a Try Fix button to resolve the problem. Clicking this button triggers a script that copies a malicious PowerShell command to the user’s clipboard. The user is then instructed to open PowerShell and paste the command, ostensibly to fix the issue.

Executing the command initiates the download and execution of obfuscated scripts from compromised websites. These scripts are designed to decode themselves at runtime and execute malicious code directly in memory, thereby avoiding detection by traditional security tools. The final payloads include information-stealing malware such as StealC and Rhadamanthys on Windows systems, and the AMOS Stealer on macOS systems. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/?utm_source=openai))

The Malware Payloads: Understanding the Threat

The ClickFix campaign deploys a variety of malware strains, each with specific capabilities:

– StealC: An information stealer that targets sensitive data, including login credentials and financial information.

– Rhadamanthys: A sophisticated stealer that can exfiltrate a wide range of data from infected systems.

– AMOS Stealer: Specifically targets macOS systems, stealing sensitive data and credentials.

These malware strains can lead to severe security breaches, including unauthorized access to personal and corporate data, financial loss, and further propagation of malware within a network.

The Role of Social Engineering

The success of the ClickFix campaign hinges on its effective use of social engineering. By creating a sense of urgency and presenting users with familiar interfaces and error messages, attackers exploit human psychology to prompt actions that compromise security. This method bypasses traditional security measures that focus on detecting automated threats, highlighting the need for user education and awareness.

Attribution and Threat Actors

According to cybersecurity firm Sekoia, the ClickFix campaign has been linked to two cybercrime groups: the Slavic Nation Empire (SNE) and Scamquerteo. These groups are considered sub-teams of larger cryptocurrency scam gangs known as Marko Polo and CryptoLove. Their operations have been observed across multiple industries since March 2024, indicating a broad and ongoing threat. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/security/fake-google-meet-conference-errors-push-infostealing-malware/?utm_source=openai))

Protective Measures: Safeguarding Against ClickFix Attacks

To defend against the ClickFix campaign and similar threats, users and organizations should implement the following measures:

1. Verify Email Sources: Scrutinize the sender’s email address and be cautious of unsolicited meeting invitations, especially those urging immediate action.

2. Inspect URLs Carefully: Before clicking on any link, hover over it to reveal the actual URL. Be wary of slight misspellings or unusual domain structures that mimic legitimate services.

3. Avoid Executing Unverified Commands: Legitimate services will never ask users to run commands in PowerShell or any other command-line interface to resolve issues.

4. Implement Security Awareness Training: Regular training sessions can help users recognize phishing attempts and understand the tactics used by cybercriminals.

5. Utilize Advanced Security Solutions: Deploy endpoint protection platforms that can detect and prevent the execution of unauthorized scripts and commands.

6. Keep Systems Updated: Regularly update operating systems and software to patch vulnerabilities that could be exploited by malware.

Conclusion

The ClickFix campaign underscores the evolving nature of cyber threats, where attackers increasingly rely on social engineering to exploit human behavior. By masquerading as trusted services like Google Meet, these campaigns can deceive even vigilant users. Awareness, education, and robust security practices are essential in mitigating the risks posed by such sophisticated attacks.