Fake Google Meet Update Can Secretly Give Attackers Control of Your PC

Security researchers at Malwarebytes have newly discovered a phishing campaign abusing legitimate Windows device management features to take control of victims’ computers without installing traditional malware.

Instead of tricking users into downloading a malicious file, the attack relies on a convincing fake Google Meet update prompt.

A Simple but Effective Phishing Page

Victims encounter a webpage that mimics a Google Meet notification urging them to install the latest version to continue using the service.

At first glance, the page appears legitimate, using familiar branding and messaging. But clicking either the “Update now” or “Learn more” buttons triggers a hidden Windows command rather than a software update.

The page launches a Windows deep link using the ms-device-enrollment URI scheme.

This built-in feature is normally used by corporate IT departments to enroll employee devices into a mobile device management (MDM) system.

In this attack, however, the enrollment request connects to an attacker-controlled management server instead.

How the Attack Takes Over a Device

When users click the button, Windows automatically opens the “Set up a work or school account” dialog—an official system prompt that looks completely legitimate.

The enrollment form is already pre-filled with attacker-controlled information, including a fake corporate account and a server address hosted on a legitimate cloud management platform.

If the user continues through the setup process, their computer becomes enrolled in the attacker’s MDM system.

Once enrolled, attackers can remotely control the device using the same capabilities available to corporate IT administrators, including:

Installing or removing software

Changing system settings

Reading files on the device

Locking the screen

Completely wiping the computer

Because the operating system itself performs these actions, there may be no malware file or suspicious process for security tools to detect.

Abuse of Legitimate Features

This campaign highlights a growing trend where attackers rely on legitimate system features rather than traditional malware.

The attack uses:

A real Windows device enrollment mechanism

A legitimate cloud MDM platform

An authentic system dialog

Since everything involved is technically legitimate, many security tools struggle to identify the activity as malicious.

How to Check if Your Device Is Affected

Users who may have interacted with the fake update page should verify whether their device has been enrolled in an unknown management system.

To check:

Open Settings

Navigate to Accounts → Access work or school

Look for any unfamiliar entries

If a suspicious enrollment appears, select it and choose Disconnect immediately.

Security experts also recommend running a full malware scan, as attackers may have pushed additional software to the system after enrollment.

Staying Safe from Similar Attacks

To avoid falling victim to similar scams:

Avoid installing updates from websites or pop-ups

Only update applications through official software channels

Be cautious of unexpected prompts requesting system changes

Verify URLs before interacting with update notifications

As attackers increasingly exploit built-in system tools instead of malware, recognizing suspicious workflows is becoming just as important as spotting malicious downloads.


Comments Section

Leave a Reply

Your email address will not be published. Required fields are marked *



,
Back to Top - Modernizing Tech