Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Weaponized Google Meet page that uses ClickFix to deliver Malicious Payload

Posted on November 29, 2025November 29, 2025 By CWS

A brand new, extremely refined malware marketing campaign has been recognized focusing on distant staff and organizations by means of a pretend Google Meet touchdown web page.

Hosted on the misleading area gogl-meet[.]com, this assault leverages the “ClickFix” social engineering approach to bypass conventional browser safety controls and ship a Distant Entry Trojan (RAT) on to the sufferer’s system.

The assault begins when a person navigates to the fraudulent web site, which is visually indistinguishable from the respectable Google Meet interface. As an alternative of a video feed, the person is interrupted by a pop-up error message, sometimes claiming a digicam or microphone subject titled “Can’t be a part of the assembly.”

In contrast to commonplace phishing that asks for credentials, this web page provides a technical “repair” that requires bodily person interplay. The immediate instructs the sufferer to carry out a particular sequence of keystrokes: Press the Home windows key + R, then CTRL + V, and eventually Enter.

Unbeknownst to the person, clicking the “Be a part of now” or “Repair” button on the web page triggers a JavaScript operate that copies a malicious PowerShell script to their clipboard.

By following the guide keystroke directions, the person unwittingly pastes and executes this script by way of the Home windows Run dialog, successfully bypassing browser-based safety filters corresponding to Google Secure Looking and SmartScreen.​

Forensic Evaluation and Indicators

Current incident response actions involving gogl-meet[.]com have confirmed that this chain results in a RAT an infection. Forensic evaluation of affected methods recognized the an infection’s root trigger by means of the Grasp File Desk (MFT).

Particularly, the MFT entry for the dropped payload revealed important origin knowledge in its Different Information Stream (ADS), capturing each the ClickFix downloaded file and the referrer URL gogl-meet[.]com.

This forensic artifact is essential for defenders, because it definitively hyperlinks the execution of the RAT again to the browser-based social engineering occasion moderately than a typical drive-by obtain or e mail attachment.

A definite attribute of this wave is the obfuscation used throughout the PowerShell payload itself. Risk actors have begun padding the malicious script with in depth feedback containing trusted visible symbols, corresponding to repeated inexperienced verify marks (✅).

When a person pastes the content material into the small Home windows Run field, these symbols stands out as the solely seen textual content, visually reassuring the sufferer that the command is “verified” or protected [memory].

This tactic additionally serves a technical goal: it may well push the precise malicious code (typically an IEX obtain cradle) out of the instant seen space of the dialog field, masking the script’s true intent.

Whereas ClickFix (additionally related to clusters like ClearFake) gained important traction all through 2024, this newest iteration demonstrates a shift towards hyper-targeted branding.

Early campaigns impersonated generic browser updates or Phrase errors. Nonetheless, the shift to Google Meet simulation suggests a pivot towards focusing on company environments the place video conferencing glitches are a standard, trusted friction level.​

Safety groups are suggested to replace detection guidelines to flag PowerShell execution strings originating from the Run dialog that comprise uncommon Unicode characters or in depth remark blocks, that are tell-tale indicators of guide execution.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Beware, ClickFix, Deliver, Google, Malicious, Meet, Page, Payload, Weaponized

Post navigation

Previous Post: French Football Federation Reports Data Breach
Next Post: New Albiriox Malware Attacking Android Users to Take Complete Control of their Device

Related Posts

Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Cyber Security News
Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users Cyber Security News
China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors Cyber Security News
Securing Multi-Cloud Infrastructures in 2025 Enterprise Deployments Cyber Security News
Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Albiriox Malware Attacking Android Users to Take Complete Control of their Device
  • Beware of Weaponized Google Meet page that uses ClickFix to deliver Malicious Payload
  • French Football Federation Reports Data Breach
  • Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
  • North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Albiriox Malware Attacking Android Users to Take Complete Control of their Device
  • Beware of Weaponized Google Meet page that uses ClickFix to deliver Malicious Payload
  • French Football Federation Reports Data Breach
  • Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
  • North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark