Back

Fake Google Meet Update Phishing Attack Grants Remote PC Access

At a glance

  • A phishing page mimics a Google Meet update to enroll Windows PCs into attacker-controlled MDM systems
  • Clicking fake update buttons triggers device enrollment using legitimate Windows features
  • Attackers gain remote administrative control after enrollment, allowing software installation and device management

A phishing campaign has been identified that uses a fake Google Meet update prompt to enroll Windows computers into a device management system controlled by attackers. This development is notable because it leverages legitimate Windows features to gain unauthorized remote access to affected devices.

The phishing page presents itself as a Google Meet update, prompting users to click “Update now” or “Learn more” buttons. When clicked, these buttons activate the Windows ms-device-enrollment: URI, which opens the official “Set up a work or school account” dialog. The dialog is pre-filled with server details controlled by the attacker, making the process appear legitimate to the user.

After the device is enrolled through this method, the attacker’s Mobile Device Management (MDM) server can use standard operating system functions to install or remove software, alter system settings, access files, and even lock or erase the device. The MDM server used in the attack is hosted on Esper, a commercial MDM platform, with specific blueprint and group identifiers embedded in the enrollment link.

Technical analysis from multiple sources, including security researchers and industry forums, has confirmed that this campaign impersonates Google Meet to enroll Windows devices into malicious MDM systems. Reports indicate that users who interact with the phishing page unknowingly grant adversaries full administrative control over their computers.

What the numbers show

  • The phishing campaign uses the ms-device-enrollment: URI to trigger Windows enrollment dialogs
  • Esper, a legitimate MDM provider, is used to host the attacker’s server with embedded group IDs
  • Security researchers and technical analysis have documented the campaign since at least March 2026

In addition to the MDM enrollment method, security researchers have documented related phishing campaigns that use fake Google Meet and Zoom pages to distribute Teramind monitoring software. These campaigns repurpose Teramind, a legitimate monitoring tool, to conduct unauthorized surveillance on Windows machines.

One variant of the attack presents a fabricated Microsoft Store page labeled as “Google Meet for Meetings,” created by a fictitious entity. This page delivers a Teramind MSI installer, further expanding the range of tools available to attackers for unauthorized access and monitoring.

Community discussions on security forums and Reddit have highlighted that these phishing campaigns trick users into enrolling their devices or installing monitoring software, resulting in adversaries gaining full control over the affected systems. The use of legitimate platforms and software in these attacks increases the risk of users being deceived by the authenticity of the prompts and installation processes.

Industry reaction

Teramind stated it was not involved in the phishing campaign and condemned any unauthorized use of its software. The company confirmed its position in response to reports of its tool being repurposed for unauthorized surveillance through these phishing incidents.

* This article is based on publicly available information at the time of writing.

Related Articles

  1. Scammers are sending fake Robinhood security alert texts using imitation domains. Users are advised to avoid clicking links in these messages.

  2. Phishing scams targeting Microsoft persist, with attackers using urgent messages and authentic-looking emails to deceive users, according to reports.

  3. A letter signed by nearly 900 employees requests the company to sever connections with immigration agencies, according to reports.

  4. A petition calling for the termination of contracts with ICE and CBP has garnered over 800 signatures, according to reports.

  5. Insect farms use black soldier fly larvae to transform food waste into high-protein animal feed, enabling scalable production, according to reports.

More on Technology

  1. AI integration in B2B software is surging, with over 80% of vendors expected to adopt generative AI by 2026, according to industry forecasts.

  2. Recent research shows bacterial colonies create complex patterns that enhance genetic diversity and survival, according to the study findings.

  3. Qatar's helium production halt in March 2026 removed 5.2 million cubic metres monthly, causing spot prices to surge 70-100%, according to reports.

  4. In December 2024, the IRS awarded Palantir a $1.8 million contract, according to agency reports. The firm has received over $180 million since 2018.

  5. NeurIPS has reversed its policy on US-sanctioned entities, according to reports. This change follows calls for a boycott of the conference.