Attack spotlight

Fake Google Meet invitation, fake Microsoft Store, real malware attack

February 19, 2026

Fake Google Meet invitation, fake Microsoft Store, real malware attack

Malware attack delivered via fake Google Meet update installer

Ready to see Sublime 
in action
Get a demo
Authors
Montel Oliver
Detection
Kyle Eaton
Detection

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. Get a live demo to see how Sublime prevents these attacks.

Email provider: Google Workspace

Attack type: malware/ransomware




Attacks featuring fake meeting invites are increasing in popularity. While these attacks are not new, they are evolving to include more convincing levels of impersonation. One specific trend we’re seeing is that more attacks that use fake Microsoft Store pages to deliver fake virtual meeting installers.

Two weeks ago, we published a post about how Zoom-based malware attacks have been targeting real estate agents, but Zoom isn't the only virtual meeting platform being impersonated. Other platforms like Microsoft Teams and Google Meet are just as prone to impersonation and abuse. In this post, we’ll look at a fake Google Meet invitation that lead to a malware installer.

Suspicious Google Meet invite

This attack starts with an impersonation of a Google Meet invitation, sent from neither a corporate nor Google Meet domain. In this case, it’s sent from a domain that’s less than a month old (a common attack signal).

If the target clicks the Join with Google Meet button, they’re taken to https://googglemeetinglnterviiew[.]live/invite.php. Note that the URL has Google Meet impersonation elements, as well as typos and character substitutions. These are both evasion tactics, the impersonation for humans and the typos/subs for scanners.

The page that launches contains an animation that imitates the “Joining…” progress screen of a Google Meet meeting.

Rather than going to a meeting, though, the target is given an Update Required pop-up.

Clicking the Update button takes the target to a fake Google Meet page in an impersonated Microsoft Store.

Clicking the Install button downloads a file impersonating a Google Meeting installer:

  • Filename: GoogleMeet_agent_x64_s-i(__1ee5a65cb5d33e5abbbffc4a09b5bb046961a0e9).msi
  • SHA256: ba19a101eb250064b986d9e2c2ba0d9ab668c3d1a37bac3f41424dc9e902fa12

Running this .msi file installs the Teramind remote monitoring tool , configured to allow the adversary to take control of the target’s system. Additionally, running the file sends a notification to the adversary over Telegram to indicate that the malicious file has been executed. This notification includes:

  • device type
  • browser type
  • OS
  • geolocation: city, country
  • IP
  • ISP

While this attack is far from the most involved impersonations we’ve seen (more to come on that in the next few weeks), it features impersonation elements and expected behaviors that fast-clicking targets could easily fall prey to.

Detection signals

Sublime's AI-powered detection engine prevents this type of attack. Some of the top detection signals were:

  • Lookalike domain: The linked URL (googglemeetinglnterviiew[.]live) attempts to impersonate Google and includes intentional misspellings for evasion.
  • Suspicious sender domain: The sender’s domain was registered within the past 20 days.
  • Google impersonation: The message’s basic HTML formatting lacks Google's standard branding elements.
  • DKIM failed: DKIM authentication failed for the message.

ASA, Sublime’s Autonomous Security Analyst, flagged this email as malicious. Here is ASA’s analysis summary for this example:

Look before you launch

Attackers use the ubiquity of virtual meetings as camouflage for their attacks, knowing human targets may not even look twice before clicking Join. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on the suspicious indicators of the scam.

If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.

Read more Attack Spotlights:

Heading

About the authors

Montel Oliver
Detection

Montel is an Email Security Analyst at Sublime. His previous work as an InfoSec Analyst has given him the insight needed to address today's email threat landscape. His curiosity, especially for malware, is ever-growing and he's always eager to dive deep into the next attack.

Kyle Eaton
Detection

Kyle is a Threat Detection Engineer at Sublime. He has spent his entire professional career within cybersecurity, including roles as a Lead Cybersecurity Analyst at Target and a Sr. Security Researcher at Proofpoint.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

March 10, 2026
Announcing Sublime Email DLP: Data loss prevention at the outbox
Sublime news

Announcing Sublime Email DLP: Data loss prevention at the outbox

Kevin Gough
Kevin Gough
Product Marketing
AJ Williams
AJ Williams
Product Manager
March 3, 2026
How we built high speed threat hunting for email security
Sublime news

How we built high speed threat hunting for email security

Hugh Oh
Hugh Oh
Engineering
February 24, 2026
Enhanced reporting and analytics provide complete visibility into email security
Sublime news

Enhanced reporting and analytics provide complete visibility into email security

Art Chavez
Art Chavez
Product Marketing
AJ Williams
AJ Williams
Product Manager

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern