A new phishing wave has been sweeping through workplaces, where attackers cleverly conceal remote-admin tools behind spoofed Zoom or Microsoft Teams invites. These emails, often embedded within legitimate conversation threads and crafted with AI-powered phishing pages, coax victims into installing a real remote monitoring tool, ConnectWise ScreenConnect—granting full system control under the guise of IT support. Once installed, attackers can freely roam corporate systems, harvesting credentials, launching lateral phishing, and hiding in plain sight among normal IT traffic. More than 900 organizations—spanning sectors like education, healthcare, finance, religious groups, and manufacturing—across the U.S., UK, Canada, and Australia have been targeted. Cybercriminals are even selling ready-made “attack kits” on dark‑web marketplaces, scaling this tactic into a Remote‑Access‑Tool‑as‑a‑Service model.
Sources: IT Pro, TechRadar, Entrepreneur Security Tech
Key Takeaways
– Familiar workflows become weaponized: Attackers exploit everyday behaviors—including meeting invites—to bypass traditional suspicion and gain system access.
– Remote monitoring tools repurposed for espionage: Tools like ConnectWise ScreenConnect, intended for legitimate IT management, are being misused to grant full control to cybercriminals.
– Commercialized cybercrime at scale: Ready‑to‑use phishing‑to‑RMM kits sold on darknet marketplaces show how mature and scalable these attacks have become.
In-Depth
In today’s hyper‑connected work life, we treat Zoom and Microsoft Teams invites like tiny blessings in our inbox—quick click, easy meeting. But attackers have taken that simple routine and twisted it into a clever attack vector. Instead of a real meeting link, victims get invitations embedded in usual email threads—with real logos, personalized contexts, and AI‑generated phishing pages that look disturbingly legit. Once clicked, what appears to be a support tool turns out to be ConnectWise ScreenConnect, giving full remote access to ill‑intentioned actors.
It’s a crafty shift in cyber-espionage tactics. Legitimate collaboration tools become unwitting Trojan horses. The attackers blend in with normal IT flow, avoiding red flags, while stealing credentials, moving laterally across networks, and even using stolen accounts to extend the attack further. And it’s not a random, one-off campaign—it’s massive, industrial-scale crime. More than 900 organizations across diverse sectors have been targeted, and “attack kits” are being sold on dark-web markets like software tools, complete with user‑friendly packaging and support.
From a pragmatic standpoint, businesses must treat these threats seriously. Perimeter-only security setups are outdated. You need AI-enhanced email filtering that spots social-engineering tricks, rigorous endpoint monitoring that flags new RMM installations, and a zero-trust posture that avoids granting unwarranted access. Employee awareness training should include simulation of such spoofed invites—awareness must keep pace with creativity. Network segmentation, strict credential hygiene, and routine incident drills can blunt these attacks before they become breaches.
It may seem aggressive—after all, it’s just a meeting invite. But today’s attackers aren’t taking shots in the dark; they’re using trusted business flows themselves. And that makes this kind of phishing far more dangerous—and urgent—to guard against.

