March 18, 2026

Fake Zoom simulates connection issues, redirects to malicious "update" installer
Zoom abuse and impersonation have become popular lure tactics for attackers. Over the past year, we’ve posted blogs about Zoom impersonation for delivering malware, Zoom impersonation to deliver phishing payloads, Zoom Docs abuse, and more. But recently, we observed an impersonation-based attack that stood out for the length it went to fool the target.
The attack starts with a fake yet convincing Zoom meeting invitation. The style and format of the message is similar to those we’ve seen generated by AI, indicating AI was likely used to create this email.

If the target clicks the Start Meeting button, they’re taken to https://zoom-meeting.yourco-invite[.]live/inc/Windows/zoom, not to an actual Zoom meeting. Once at the site, the target is presented with a verification challenge to determine if the target is a bot or human.

After clicking the box, the target is presented with a spoofed Cloudflare security check.

One of the checks verifies that the target is running Windows. If the target is not on Windows, the attack ends.

If the target is on Windows, they're taken to a fake Zoom meeting.

After the initial Zoom splash screen, the target is taken to a fake waiting room that features information about the Zoom, including length and number of participants.

After clicking Joining Meeting, the target is prompted to allow the site to use their microphone and video, like in a real meeting.

Next is the most interesting part. The target is taken to a fake Zoom meeting that is actually an imitation created with JavaScript (likely AI-generated, per indicators within page source).
As fake attendees join, there is a warning about network issues, as well as choppy audio to simulate a Zoom riddled with technical issues. After a few seconds of choppy audio, an Update Available pop up appears, followed by a redirect to a fake Microsoft Store page for downloading a fake Zoom Workspace update.
Since this simulation is JavaScript and not a recorded video, the Zoom is interactive (e.g. clickable buttons) and it can be easily adjusted to better fool the target. For example, participant names can be changed to the names of people the target actually knows (with the help of social media):
Or voice files could be updated to use AI-generated voices that impersonate real people:
When the Update Available screen appears, the page attempts to download the file ZoomUpdateInstaller.msi. While this file appears to be a Zoom installer, it actually installs ScreenConnect, a legitimate remote administration tool delivered with parameters that allow the adversary to take control of the target system.
Alternatively, the target can click the Install button to launch the same download manually.

After the .msi file is downloaded, the target is taken to a post-download screen that explains how to run the fake Zoom update that installs maliciously-configured ScreenConnect.

Sublime's AI-powered detection engine detected this attack. Some of the top detection signals were:
zoom-meeting.yourco-invite[.]live) is completely unrelated to Zoom's official domains./inc/Windows/zoom), even though Zoom runs on a variety of operating systems (e.g. MacOS).ASA, Sublime’s Autonomous Security Analyst, flagged this email as malicious. Here is ASA’s analysis summary from the first example:

Attackers use the ubiquity of Zoom as camouflage for their attacks, knowing human targets may not even look twice before clicking Join. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on the suspicious indicators of the scam.
If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.
Read more Attack Spotlights:
Sublime releases, detections, blogs, events, and more directly to your inbox.
See how Sublime delivers autonomous protection by default, with control on demand.