<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Social_engineering — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/social_engineering/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 12:47:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/social_engineering/feed.xml" rel="self" type="application/rss+xml"/><item><title>Zoom-themed Phishing Campaign Delivering ConnectWise ScreenConnect</title><link>https://feed.craftedsignal.io/briefs/2026-05-zoom-screenconnect/</link><pubDate>Mon, 18 May 2026 12:47:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-zoom-screenconnect/</guid><description>A phishing campaign impersonates Zoom to trick users into downloading and installing ConnectWise ScreenConnect, a legitimate remote monitoring and management tool, allowing attackers to gain persistent remote access, harvest credentials, and deploy secondary malware such as ransomware.</description><content:encoded><![CDATA[<p>This phishing campaign leverages social engineering techniques using the Zoom platform as a lure to trick users into installing ConnectWise ScreenConnect, a legitimate remote monitoring and management (RMM) tool. Attackers send emails impersonating Zoom meeting invitations. These emails redirect victims to fake Zoom-branded landing pages that use audio playback and fraudulent software update prompts to persuade victims to download and execute a disguised VBS installer. This installer silently downloads and launches the ScreenConnect payload, granting attackers persistent remote access to compromised systems. The attackers abuse trusted platforms and legitimate administrative tools to blend malicious activity into normal enterprise behavior, enabling credential theft, reconnaissance, lateral movement, and potential ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The victim receives a phishing email impersonating a Zoom meeting invitation, containing a hyperlink to a spoofed Zoom-branded landing page.</li>
<li>Upon clicking the link, the victim is redirected to a fake Zoom meeting page designed to mimic a legitimate Zoom interface.</li>
<li>The fake meeting page plays a distorted audio track to simulate a real meeting environment and requests microphone access.</li>
<li>After a few seconds, a popup appears, falsely notifying the user that a Zoom update is available and automatically downloaded.</li>
<li>The victim is redirected to a separate page with instructions to run the downloaded &ldquo;update&rdquo;, a VBS file named &ldquo;_zoommeeting_Zoom_installer_64_bit.exe.vbs&rdquo;.</li>
<li>The VBS file, when executed via Windows Script Host, downloads the ScreenConnect installer (ScreenConnect.ClientSetup.msi) from a hardcoded URL (212[.]11[.]64[.]45) to the user&rsquo;s %TEMP% directory.</li>
<li>The ScreenConnect installer is launched in a hidden window, installing the remote access tool on the victim&rsquo;s system.</li>
<li>Attackers leverage ScreenConnect for credential theft, internal reconnaissance, lateral movement, and potential deployment of secondary payloads, such as ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to the installation of ConnectWise ScreenConnect, granting attackers persistent remote access to the victim&rsquo;s system. This access allows attackers to perform credential theft, internal reconnaissance, lateral movement within the network, and the potential deployment of secondary payloads, such as ransomware. The use of a legitimate RMM tool like ScreenConnect allows attackers to blend malicious activity with expected enterprise administration behavior, making detection more difficult.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block the malicious domains and IP addresses associated with the phishing campaign at the network level to prevent initial access (IOC table: <code>nasbv[.]site</code>, <code>104[.]21[.]56[.]35</code>, <code>172[.]67[.]176[.]105</code>, <code>212[.]11[.]64[.]45</code>).</li>
<li>Implement endpoint detection rules to identify the execution of VBS scripts downloading and launching MSI installers from unusual locations like the %TEMP% directory (see Sigma rule: &ldquo;Detect Suspicious VBScript Downloading MSI&rdquo;).</li>
<li>Monitor for the installation and execution of ConnectWise ScreenConnect from unexpected sources, specifically when initiated by a VBScript process (see Sigma rule: &ldquo;Detect ScreenConnect Installation via VBScript&rdquo;).</li>
<li>Implement application control policies to restrict the execution of VBScripts from the %TEMP% directory to prevent the execution of the malicious downloader.</li>
<li>Educate users about the risks of social engineering attacks and the importance of verifying software update prompts, especially those delivered through web pages.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>remote_access</category><category>social_engineering</category><category>screenconnect</category><category>zoom</category></item></channel></rss>