Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Beware of Weaponized Google Meet page that uses ClickFix to deliver Malicious Payload

Beware of Weaponized Google Meet page that uses ClickFix to deliver Malicious Payload

Posted on November 29, 2025November 29, 2025 By CWS

A brand new, extremely refined malware marketing campaign has been recognized focusing on distant staff and organizations by means of a pretend Google Meet touchdown web page.

Hosted on the misleading area gogl-meet[.]com, this assault leverages the “ClickFix” social engineering approach to bypass conventional browser safety controls and ship a Distant Entry Trojan (RAT) on to the sufferer’s system.

The assault begins when a person navigates to the fraudulent web site, which is visually indistinguishable from the respectable Google Meet interface. As an alternative of a video feed, the person is interrupted by a pop-up error message, sometimes claiming a digicam or microphone subject titled “Can’t be a part of the assembly.”

In contrast to commonplace phishing that asks for credentials, this web page provides a technical “repair” that requires bodily person interplay. The immediate instructs the sufferer to carry out a particular sequence of keystrokes: Press the Home windows key + R, then CTRL + V, and eventually Enter.

Unbeknownst to the person, clicking the “Be a part of now” or “Repair” button on the web page triggers a JavaScript operate that copies a malicious PowerShell script to their clipboard.

By following the guide keystroke directions, the person unwittingly pastes and executes this script by way of the Home windows Run dialog, successfully bypassing browser-based safety filters corresponding to Google Secure Looking and SmartScreen.​

Forensic Evaluation and Indicators

Current incident response actions involving gogl-meet[.]com have confirmed that this chain results in a RAT an infection. Forensic evaluation of affected methods recognized the an infection’s root trigger by means of the Grasp File Desk (MFT).

Particularly, the MFT entry for the dropped payload revealed important origin knowledge in its Different Information Stream (ADS), capturing each the ClickFix downloaded file and the referrer URL gogl-meet[.]com.

This forensic artifact is essential for defenders, because it definitively hyperlinks the execution of the RAT again to the browser-based social engineering occasion moderately than a typical drive-by obtain or e mail attachment.

A definite attribute of this wave is the obfuscation used throughout the PowerShell payload itself. Risk actors have begun padding the malicious script with in depth feedback containing trusted visible symbols, corresponding to repeated inexperienced verify marks (✅).

When a person pastes the content material into the small Home windows Run field, these symbols stands out as the solely seen textual content, visually reassuring the sufferer that the command is “verified” or protected [memory].

This tactic additionally serves a technical goal: it may well push the precise malicious code (typically an IEX obtain cradle) out of the instant seen space of the dialog field, masking the script’s true intent.

Whereas ClickFix (additionally related to clusters like ClearFake) gained important traction all through 2024, this newest iteration demonstrates a shift towards hyper-targeted branding.

Early campaigns impersonated generic browser updates or Phrase errors. Nonetheless, the shift to Google Meet simulation suggests a pivot towards focusing on company environments the place video conferencing glitches are a standard, trusted friction level.​

Safety groups are suggested to replace detection guidelines to flag PowerShell execution strings originating from the Run dialog that comprise uncommon Unicode characters or in depth remark blocks, that are tell-tale indicators of guide execution.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Beware, ClickFix, Deliver, Google, Malicious, Meet, Page, Payload, Weaponized

Post navigation

Previous Post: French Football Federation Reports Data Breach
Next Post: New Albiriox Malware Attacking Android Users to Take Complete Control of their Device

Related Posts

Dead Man’s Switch – Widespread npm Supply Chain Attack Driving Malware Attacks Dead Man’s Switch – Widespread npm Supply Chain Attack Driving Malware Attacks Cyber Security News
Google Confirms That Claims of Major Gmail Security Warning are False Google Confirms That Claims of Major Gmail Security Warning are False Cyber Security News
Critical HPE Telco Service Activator Security Flaw Exposed Critical HPE Telco Service Activator Security Flaw Exposed Cyber Security News
WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack Cyber Security News
Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges Cyber Security News
Sendmarc appoints Rob Bowker as North American Region Lead Sendmarc appoints Rob Bowker as North American Region Lead Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark