Attack spotlight

Advanced fake Zoom installer used for delivering malware

March 18, 2026

Advanced fake Zoom installer used for delivering malware

Fake Zoom simulates connection issues, redirects to malicious "update" installer

Ready to see Sublime 
in action
Get a demo
Authors
Kyle Eaton
Detection
Threat Research Team
Sublime

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. Get a live demo to see how Sublime prevents these attacks.

Email provider: Google Workspace

Attack type: malware/ransomware




Zoom abuse and impersonation have become popular lure tactics for attackers. Over the past year, we’ve posted blogs about Zoom impersonation for delivering malware, Zoom impersonation to deliver phishing payloads, Zoom Docs abuse, and more. But recently, we observed an impersonation-based attack that stood out for the length it went to fool the target.

Fake Zoom, real attack

The attack starts with a fake yet convincing Zoom meeting invitation. The style and format of the message is similar to those we’ve seen generated by AI, indicating AI was likely used to create this email.

If the target clicks the Start Meeting button, they’re taken to https://zoom-meeting.yourco-invite[.]live/inc/Windows/zoom, not to an actual Zoom meeting. Once at the site, the target is presented with a verification challenge to determine if the target is a bot or human.

After clicking the box, the target is presented with a spoofed Cloudflare security check.

One of the checks verifies that the target is running Windows. If the target is not on Windows, the attack ends.

If the target is on Windows, they're taken to a fake Zoom meeting.

After the initial Zoom splash screen, the target is taken to a fake waiting room that features information about the Zoom, including length and number of participants.

After clicking Joining Meeting, the target is prompted to allow the site to use their microphone and video, like in a real meeting.

JavaScript, not Zoom

Next is the most interesting part. The target is taken to a fake Zoom meeting that is actually an imitation created with JavaScript (likely AI-generated, per indicators within page source).

As fake attendees join, there is a warning about network issues, as well as choppy audio to simulate a Zoom riddled with technical issues. After a few seconds of choppy audio, an Update Available pop up appears, followed by a redirect to a fake Microsoft Store page for downloading a fake Zoom Workspace update.

Since this simulation is JavaScript and not a recorded video, the Zoom is interactive (e.g. clickable buttons) and it can be easily adjusted to better fool the target. For example, participant names can be changed to the names of people the target actually knows (with the help of social media):

const PARTICIPANTS = [
    {id:'host', name:'Matthew Karlsson', initials:'MK', role:'Meeting Host', audioFile:'audio/conversation-1.mp3', joinDelay:500, leaveDelay:null, isHost:true},
    {id:'guest', name:'James Whitmore', initials:'JW', role:'Guest', audioFile:'audio/conversation-2.mp3', joinDelay:1500, leaveDelay:100000, isHost:false},
    {id:'guest', name:'Sarah Chen', initials:'SC', role:'Guest', audioFile:'audio/conversation-3.mp3', joinDelay:2500, leaveDelay:80000, isHost:false}
];

Or voice files could be updated to use AI-generated voices that impersonate real people:

const AUDIO_FILES = {
    userJoined:'audio/user-joined.mp3',
    userLeft:'audio/user-left.mp3',
    mute:'audio/mute.mp3',
    unmute:'audio/unmute.mp3',
    newSpeaker:'audio/new-speaker.mp3',
    recordingStart:'audio/recording-start.mp3',
    recordingStop:'audio/recording-stop.mp3'
};

Payload delivery with instructions

When the Update Available screen appears, the page attempts to download the file ZoomUpdateInstaller.msi. While this file appears to be a Zoom installer, it actually installs ScreenConnect, a legitimate remote administration tool delivered with parameters that allow the adversary to take control of the target system.

Alternatively, the target can click the Install button to launch the same download manually.

After the .msi file is downloaded, the target is taken to a post-download screen that explains how to run the fake Zoom update that installs maliciously-configured ScreenConnect.

Detection signals

Sublime's AI-powered detection engine detected this attack. Some of the top detection signals were:

  • Zoom impersonation: While the email is formatted to look like a real Zoom meeting invitation, the Start Meeting destination domain (zoom-meeting.yourco-invite[.]live) is completely unrelated to Zoom's official domains.
  • Suspicious URL: The malicious URL path structure indicates that the attack is targeting Windows systems (/inc/Windows/zoom), even though Zoom runs on a variety of operating systems (e.g. MacOS).
  • Free email provider: The Zoom meeting was sent from a Gmail account, not a corporate account.

ASA, Sublime’s Autonomous Security Analyst, flagged this email as malicious. Here is ASA’s analysis summary from the first example:

Don’t let Zoom fatigue lower your guard

Attackers use the ubiquity of Zoom as camouflage for their attacks, knowing human targets may not even look twice before clicking Join. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on the suspicious indicators of the scam.

If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.

Read more Attack Spotlights:

Heading

About the authors

Kyle Eaton
Detection

Kyle is a Threat Detection Engineer at Sublime. He has spent his entire professional career within cybersecurity, including roles as a Lead Cybersecurity Analyst at Target and a Sr. Security Researcher at Proofpoint.

Threat Research Team
Sublime

The Threat Research team at Sublime is responsible for performing deep dive analyses of new and evolving threats. They use cutting-edge tools and open-source intelligence to understand the full scope of threats and threat actors.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

March 18, 2026
Advanced fake Zoom installer used for delivering malware
Attack spotlight

Advanced fake Zoom installer used for delivering malware

Kyle Eaton
Kyle Eaton
Detection
Threat Research Team
Threat Research Team
Sublime
March 10, 2026
Announcing Sublime Email DLP: Data loss prevention at the outbox
Sublime news

Announcing Sublime Email DLP: Data loss prevention at the outbox

AJ Williams
AJ Williams
Product Manager
Madison Caldwell
Madison Caldwell
Engineering
Gregory Climer
Gregory Climer
Engineering
March 3, 2026
How we built high speed threat hunting for email security
Sublime news

How we built high speed threat hunting for email security

Hugh Oh
Hugh Oh
Engineering

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern