Could the Google Meet error be a cunning hacker tactic?

Be cautious when accepting Google Meet invitations.

Could the Google Meet error be a cunning hacker tactic?
Could the Google Meet error be a cunning hacker tactic?

In the U.S., a new scam called ClickFix is gaining popularity. It tricks users into clicking on a link that claims to fix an issue, but in reality, it infects their computers with malware.

Earlier, I reported on how threat actors used fake error messages from Google Chrome, Microsoft Word, and OneDrive to infect users' computers.

Google Meet users, regardless of their operating system, are now being targeted by a similar type of cyberattack. I provide an explanation of how this attack works and offer suggestions on how to safeguard yourself.

woman on laptop
A woman working on her laptop (Kurt "CyberGuy" Knutsson)

How the Google Meet trap works

A fake Google Meet page will soon appear after clicking on a link in an email that appears to be related to your organization. The email may come from any address and be socially engineered to look legitimate. The fake Google Meet page will display a warning claiming there's an issue with your PC, such as problems with your microphone, camera, or headset.

You can expect to see the following URLs in these fake meeting emails:

meet[.]google[.]us-join[.]com

meet[.]google[.]web-join[.]com

meet[.]googie[.]com-join[.]us

meet[.]google[.]cdm-join[.]us

Malicious code is pasted into the Windows prompt when you follow the instructions on this fake page, infecting your computer with malware. Hackers can then gain access to your cryptocurrencies, sensitive files, and personal information.

Beyond Google Meet, Sekoia has discovered malware distribution clusters on various platforms, including Zoom, PDF readers, fake video games such as Lunacy, Calipso, Battleforge, and Ragon, web3 browsers, and projects like NGT Studio and messenger apps like Nortex.

google meet 2
Fake Google Meet page (Sekoia)

The bigger picture

In July, McAfee observed an increase in ClickFix campaigns, particularly in the U.S. and Japan (via Bleeping Computer). Recently, two groups, Slavic Nation Empire and Scamquerteo, have been linked to these attacks. Both are believed to be affiliated with larger crypto scam gangs, Marko Polo and CryptoLove.

This year, Proofpoint discovered that malware was spreading through fake error messages for Google Chrome, Word, and OneDrive, which tricked individuals into downloading malicious code. Additionally, the company highlighted the "email lure" technique, where hackers send fraudulent emails posing as MS Word to infect computers.

google meet 3
Fake page requests (Sekoia)

4 ways to protect yourself from harmful software

To safeguard yourself from cyberattacks caused by fake Google Meet pages, you can take several steps.

To safeguard yourself from malicious links and malware that can compromise your private information, it is crucial to have antivirus software installed on all your devices. Additionally, it can alert you of phishing emails and ransomware scams. Here are my top picks for the best 2024 antivirus protection for Windows, Mac, Android, and iOS devices.

Keep track of your finances: Regularly examine your bank and credit card statements for any unauthorized activity. If you detect any suspicious transactions, promptly inform your bank or credit card provider.

Request a fraud alert on your credit file by contacting one of the three major credit reporting agencies (Equifax, Experian or TransUnion). This will make it harder for identity thieves to open new accounts in your name without verification.

Two-factor authentication should be enabled whenever possible to enhance security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.

Kurt’s key takeaways

Malware can be installed on your computer through social engineering tactics used by hackers. They create emails and website prompts that appear legitimate, but are actually designed to trick you into clicking on a link and following their instructions. To safeguard yourself, be cautious of clicking on links from unknown sources and always verify the URL of the page you're visiting before taking any action.

Have you ever received an email or prompt that appeared legitimate but turned out to be suspicious? Please share your experiences with us by contacting Cyberguy.com/Contact.

To receive my tech tips and security alerts, sign up for my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter.

Let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

by Kurt Knutsson, CyberGuy Report

tech

Has your friend's phone number been compromised? Here are the signs to watch out for.

Has your friend's phone number been compromised? Here are the signs to watch out for.

tech
No tennis partner? No problem with this AI robot.

No tennis partner? No problem with this AI robot.

tech
iOS 18.1's new AI features offer helpful hacks for Siri, photo magic, and writing assistance.

iOS 18.1's new AI features offer helpful hacks for Siri, photo magic, and writing assistance.

tech
Across the US, the landscape of artificial intelligence is constantly evolving.

Across the US, the landscape of artificial intelligence is constantly evolving.

tech
By observing videos, robots can mimic human surgeons' skills.

By observing videos, robots can mimic human surgeons' skills.

tech
New fears arise from Siberia's 'Gateway to Hell' crater

New fears arise from Siberia's 'Gateway to Hell' crater

tech
The US agriculture industry is exploring the use of artificial intelligence: 'Great prospects'

The US agriculture industry is exploring the use of artificial intelligence: 'Great prospects'

tech
Amazon's VP provides guidance on safeguarding against holiday impersonation frauds.

Amazon's VP provides guidance on safeguarding against holiday impersonation frauds.

tech
7 things to avoid posting online to prevent harm.

7 things to avoid posting online to prevent harm.

tech
Be cautious of these 6 gift card scams during the holiday season.

Be cautious of these 6 gift card scams during the holiday season.

tech
The Apple Watch's real-time translation feature allows you to communicate with people who speak different languages.

The Apple Watch's real-time translation feature allows you to communicate with people who speak different languages.

tech
How to politely request people not to share photos of your children on social media.

How to politely request people not to share photos of your children on social media.

tech
Regain access to your Facebook account with these steps.

Regain access to your Facebook account with these steps.

tech
Protect your retirement accounts and future with a VPN.

Protect your retirement accounts and future with a VPN.

tech
Use AI to plan your next free trip.

Use AI to plan your next free trip.

tech
Allegations of using AI to fabricate testimony against conservative YouTuber in Minnesota case brought against Stanford professor.

Allegations of using AI to fabricate testimony against conservative YouTuber in Minnesota case brought against Stanford professor.

tech