❌

Normal view

How fake party invitations are being used to install remote access tools

2 February 2026 at 11:18

β€œYou’re invited!” 

It soundsΒ friendly,Β familiarΒ and quiteΒ harmless.Β But in aΒ scamΒ we recentlyΒ spotted, thatΒ simpleΒ phrase is beingΒ usedΒ to trick victims into installing a full remote access tool on theirΒ WindowsΒ computersβ€”giving attackers complete control of the system.Β 

What appears to be aΒ casual party or event invitationΒ leads toΒ the silent installation ofΒ ScreenConnect, a legitimate remoteΒ supportΒ toolΒ quietly installedΒ in the background and abused byΒ attackers.Β 

Here’s how theΒ scamΒ works, whyΒ it’sΒ effective, andΒ how to protect yourself.Β 

TheΒ email: AΒ partyΒ invitationΒ 

Victims receive an email framed as a personal invitationβ€”often written to look like it came from a friend or acquaintance. The message is deliberately informal and social, lowering suspicion and encouraging quick action.Β 

In the screenshot below, the email arrived from a friend whose email account had been hacked, but it could just as easily come from a sender you don’t know.

So far,Β we’veΒ only seenΒ thisΒ campaignΒ targetingΒ peopleΒ in theΒ UK,Β butΒ there’s nothingΒ stoppingΒ it from expandingΒ elsewhere.Β 

Clicking the link in the email leadsΒ to a polishedΒ invitationΒ page hosted on an attacker-controlled domain.Β 

Party invitation email from a contact

TheΒ invite: TheΒ landing pageΒ thatΒ leads to an installerΒ 

The landing page leans heavily into theΒ partyΒ theme,Β but instead of showing event details, the pageΒ nudgesΒ the user toward opening a file. None of them look dangerous on their own, but together theyΒ keep the user focused on theΒ β€œinvitation” file:Β 

  • A boldΒ β€œYou’re Invited!” headlineΒ 
  • The suggestion that aΒ friend had sent the invitationΒ 
  • AΒ messageΒ sayingΒ the invitation is best viewed on aΒ Windows laptop or desktop
  • A countdownΒ suggestingΒ yourΒ invitation is already β€œdownloading” 
  • A message implying urgency and social proof (β€œI opened mine and it was so easy!”)Β 

Within seconds, the browser is redirected to downloadΒ RSVPPartyInvitationCard.msiΒ 

The page even triggers the download automatically to keep the victim moving forward without stopping to think.Β 

This MSI fileΒ isn’tΒ an invitation.Β It’sΒ an installer.Β 

The landing page

TheΒ guest: What the MSIΒ actuallyΒ doesΒ 

When theΒ user opens theΒ MSI file, it launchesΒ msiexec.exeΒ andΒ silentlyΒ installsΒ ScreenConnectΒ Client, a legitimate remote access tool often used by IT support teams.Β Β 

There’sΒ noΒ invitation, RSVP form, or calendar entry.Β 

What happens instead:Β 

  • ScreenConnectΒ binaries areΒ installedΒ underΒ C:\Program Files (x86)\ScreenConnectΒ Client\Β 
  • AΒ persistent Windows serviceΒ is createdΒ (for example,Β ScreenConnectΒ ClientΒ 18d1648b87bb3023)Β 
  • ScreenConnectΒ installsΒ multiple .NET-based componentsΒ 
  • There is no clear user-facingΒ indicationΒ that a remote access tool is being installedΒ 

From the victim’s perspective,Β very littleΒ seems to happen. But at this point, the attackerΒ can now remotely accessΒ theirΒ computer.Β 

TheΒ after-party: RemoteΒ accessΒ isΒ establishedΒ 

Once installed, the ScreenConnect client initiates encrypted outbound connections to ScreenConnect’s relay servers, including a uniquely assigned instance domain.

That connectionΒ givesΒ the attacker theΒ same level of access as a remote ITΒ technician, including theΒ ability to:Β 

  • SeeΒ the victim’s screen in real time
  • ControlΒ theΒ mouse and keyboardΒ 
  • Upload or downloadΒ filesΒ 
  • KeepΒ accessΒ even after the computer is restartedΒ 

BecauseΒ ScreenConnectΒ is legitimate softwareΒ commonlyΒ usedΒ for remote support,Β its presenceΒ isn’tΒ always obvious. On a personal computer, the first signs are often behavioral, such as unexplained cursor movement, windows opening on their own, or a ScreenConnect process the user doesn’t remember installing.Β 

WhyΒ thisΒ scamΒ worksΒ 

This campaign is effective because it targetsΒ normal, predictable human behavior. From a behavioral security standpoint, it exploitsΒ our naturalΒ curiosityΒ andΒ appears to beΒ a lowΒ risk.Β 

Most peopleΒ don’tΒ think of invitations as dangerous. Opening one feels passive,Β like glancing at a flyer or checking a message, not installing software.Β 

Even security-aware users are trained to watch out for warnings and pressure. A friendly β€œyou’re invited” messageΒ doesn’tΒ trigger those alarms.Β 

By the time something feels off, the software is already installed.Β 

Signs your computer may be affectedΒ 

Watch for:Β 

  • A download or executed file namedΒ RSVPPartyInvitationCard.msiΒ 
  • AnΒ unexpected installation ofΒ ScreenConnectΒ ClientΒ 
  • AΒ Windows serviceΒ namedΒ ScreenConnectΒ ClientΒ with random charactersΒ Β 
  • Your computer makes outbound HTTPS connections toΒ ScreenConnectΒ relay domainsΒ 
  • Your system resolvesΒ the invitation-hosting domain used in this campaign,Β xnyr[.]digitalΒ 

How to stay safeΒ Β 

This campaign is a reminder that modern attacks oftenΒ don’tΒ break inβ€”they’reΒ invited in.Β Remote access tools give attackers deep control over a system. Acting quickly can limitΒ the damage.Β Β 

For individualsΒ 

If you receive an email like this:Β 

  • Be suspicious of invitations that ask you to download or open softwareΒ 
  • Never run MSI files from unsolicited emailsΒ 
  • Verify invitations through another channel before opening anythingΒ 

If you already clicked or ran the file:Β Β 

  • Disconnect from the internetΒ immediatelyΒ 
  • Check forΒ ScreenConnectΒ and uninstall it if presentΒ 
  • Run a full security scanΒ 
  • Change important passwords from a clean, unaffected deviceΒ 

ForΒ organisationsΒ (especially in the UK)Β 

  • Alert onΒ unauthorizedΒ ScreenConnectΒ installations
  • Restrict MSI execution whereΒ feasibleΒ 
  • Treat β€œremote support tools” as high-risk software
  • Educate users:Β invitationsΒ don’tΒ come as installersΒ 

This scam works by installing a legitimate remote access tool without clear user intent. That’s exactly the gap Malwarebytes is designed to catch.

Malwarebytes now detects newly installed remote access tools and alerts you when one appears on your system. You’re then given a choice: confirm that the tool is expected and trusted, or remove it if it isn’t.


We don’t just report on threatsβ€”we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices byΒ downloading Malwarebytes today.

How fake party invitations are being used to install remote access tools

2 February 2026 at 11:18

β€œYou’re invited!” 

It soundsΒ friendly,Β familiarΒ and quiteΒ harmless.Β But in aΒ scamΒ we recentlyΒ spotted, thatΒ simpleΒ phrase is beingΒ usedΒ to trick victims into installing a full remote access tool on theirΒ WindowsΒ computersβ€”giving attackers complete control of the system.Β 

What appears to be aΒ casual party or event invitationΒ leads toΒ the silent installation ofΒ ScreenConnect, a legitimate remoteΒ supportΒ toolΒ quietly installedΒ in the background and abused byΒ attackers.Β 

Here’s how theΒ scamΒ works, whyΒ it’sΒ effective, andΒ how to protect yourself.Β 

TheΒ email: AΒ partyΒ invitationΒ 

Victims receive an email framed as a personal invitationβ€”often written to look like it came from a friend or acquaintance. The message is deliberately informal and social, lowering suspicion and encouraging quick action.Β 

In the screenshot below, the email arrived from a friend whose email account had been hacked, but it could just as easily come from a sender you don’t know.

So far,Β we’veΒ only seenΒ thisΒ campaignΒ targetingΒ peopleΒ in theΒ UK,Β butΒ there’s nothingΒ stoppingΒ it from expandingΒ elsewhere.Β 

Clicking the link in the email leadsΒ to a polishedΒ invitationΒ page hosted on an attacker-controlled domain.Β 

Party invitation email from a contact

TheΒ invite: TheΒ landing pageΒ thatΒ leads to an installerΒ 

The landing page leans heavily into theΒ partyΒ theme,Β but instead of showing event details, the pageΒ nudgesΒ the user toward opening a file. None of them look dangerous on their own, but together theyΒ keep the user focused on theΒ β€œinvitation” file:Β 

  • A boldΒ β€œYou’re Invited!” headlineΒ 
  • The suggestion that aΒ friend had sent the invitationΒ 
  • AΒ messageΒ sayingΒ the invitation is best viewed on aΒ Windows laptop or desktop
  • A countdownΒ suggestingΒ yourΒ invitation is already β€œdownloading” 
  • A message implying urgency and social proof (β€œI opened mine and it was so easy!”)Β 

Within seconds, the browser is redirected to downloadΒ RSVPPartyInvitationCard.msiΒ 

The page even triggers the download automatically to keep the victim moving forward without stopping to think.Β 

This MSI fileΒ isn’tΒ an invitation.Β It’sΒ an installer.Β 

The landing page

TheΒ guest: What the MSIΒ actuallyΒ doesΒ 

When theΒ user opens theΒ MSI file, it launchesΒ msiexec.exeΒ andΒ silentlyΒ installsΒ ScreenConnectΒ Client, a legitimate remote access tool often used by IT support teams.Β Β 

There’sΒ noΒ invitation, RSVP form, or calendar entry.Β 

What happens instead:Β 

  • ScreenConnectΒ binaries areΒ installedΒ underΒ C:\Program Files (x86)\ScreenConnectΒ Client\Β 
  • AΒ persistent Windows serviceΒ is createdΒ (for example,Β ScreenConnectΒ ClientΒ 18d1648b87bb3023)Β 
  • ScreenConnectΒ installsΒ multiple .NET-based componentsΒ 
  • There is no clear user-facingΒ indicationΒ that a remote access tool is being installedΒ 

From the victim’s perspective,Β very littleΒ seems to happen. But at this point, the attackerΒ can now remotely accessΒ theirΒ computer.Β 

TheΒ after-party: RemoteΒ accessΒ isΒ establishedΒ 

Once installed, the ScreenConnect client initiates encrypted outbound connections to ScreenConnect’s relay servers, including a uniquely assigned instance domain.

That connectionΒ givesΒ the attacker theΒ same level of access as a remote ITΒ technician, including theΒ ability to:Β 

  • SeeΒ the victim’s screen in real time
  • ControlΒ theΒ mouse and keyboardΒ 
  • Upload or downloadΒ filesΒ 
  • KeepΒ accessΒ even after the computer is restartedΒ 

BecauseΒ ScreenConnectΒ is legitimate softwareΒ commonlyΒ usedΒ for remote support,Β its presenceΒ isn’tΒ always obvious. On a personal computer, the first signs are often behavioral, such as unexplained cursor movement, windows opening on their own, or a ScreenConnect process the user doesn’t remember installing.Β 

WhyΒ thisΒ scamΒ worksΒ 

This campaign is effective because it targetsΒ normal, predictable human behavior. From a behavioral security standpoint, it exploitsΒ our naturalΒ curiosityΒ andΒ appears to beΒ a lowΒ risk.Β 

Most peopleΒ don’tΒ think of invitations as dangerous. Opening one feels passive,Β like glancing at a flyer or checking a message, not installing software.Β 

Even security-aware users are trained to watch out for warnings and pressure. A friendly β€œyou’re invited” messageΒ doesn’tΒ trigger those alarms.Β 

By the time something feels off, the software is already installed.Β 

Signs your computer may be affectedΒ 

Watch for:Β 

  • A download or executed file namedΒ RSVPPartyInvitationCard.msiΒ 
  • AnΒ unexpected installation ofΒ ScreenConnectΒ ClientΒ 
  • AΒ Windows serviceΒ namedΒ ScreenConnectΒ ClientΒ with random charactersΒ Β 
  • Your computer makes outbound HTTPS connections toΒ ScreenConnectΒ relay domainsΒ 
  • Your system resolvesΒ the invitation-hosting domain used in this campaign,Β xnyr[.]digitalΒ 

How to stay safeΒ Β 

This campaign is a reminder that modern attacks oftenΒ don’tΒ break inβ€”they’reΒ invited in.Β Remote access tools give attackers deep control over a system. Acting quickly can limitΒ the damage.Β Β 

For individualsΒ 

If you receive an email like this:Β 

  • Be suspicious of invitations that ask you to download or open softwareΒ 
  • Never run MSI files from unsolicited emailsΒ 
  • Verify invitations through another channel before opening anythingΒ 

If you already clicked or ran the file:Β Β 

  • Disconnect from the internetΒ immediatelyΒ 
  • Check forΒ ScreenConnectΒ and uninstall it if presentΒ 
  • Run a full security scanΒ 
  • Change important passwords from a clean, unaffected deviceΒ 

ForΒ organisationsΒ (especially in the UK)Β 

  • Alert onΒ unauthorizedΒ ScreenConnectΒ installations
  • Restrict MSI execution whereΒ feasibleΒ 
  • Treat β€œremote support tools” as high-risk software
  • Educate users:Β invitationsΒ don’tΒ come as installersΒ 

This scam works by installing a legitimate remote access tool without clear user intent. That’s exactly the gap Malwarebytes is designed to catch.

Malwarebytes now detects newly installed remote access tools and alerts you when one appears on your system. You’re then given a choice: confirm that the tool is expected and trusted, or remove it if it isn’t.


We don’t just report on threatsβ€”we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices byΒ downloading Malwarebytes today.

A Beginner’s Guide to the CVE Database

20 November 2025 at 02:47
A Beginner’s Guide to the CVE Database

Keeping websites and applications secure starts with knowing which vulnerabilities exist, how severe they are, and whether they affect your stack. That’s exactly where the CVE program shines. Below, we’ll cover some CVE fundamentals, including what they are, how to search and understand the data, and how to translate this information into actionable steps.

Introduction to the CVE database
So, what is CVE?

CVE stands for Common Vulnerabilities and Exposures, a community-driven program that assigns unique identifiers to publicly known vulnerabilities.

Continue reading A Beginner’s Guide to the CVE Database at Sucuri Blog.

GoSpoof – Turning Attacks into IntelΒ 

By: BHIS
29 October 2025 at 15:00

Imagine this: You’re an attacker ready to get their hands on valuable data that you can sell to afford going on a sweet vacation. You do your research, your recon, everything, ensuring that there’s no way this can go wrong. The day of the attack, you brew some coffee, crack your knuckles, and get started. A few hours into the service scan, you come to realize that all the network ports are open, but in use.

The post GoSpoof – Turning Attacks into IntelΒ  appeared first on Black Hills Information Security, Inc..

Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 2)

By: BHIS
1 October 2025 at 16:00

But what if we need to wrangle Windows Event Logs for more than one system? In part 2, we’ll wrangle EVTX logs at scale by incorporating Hayabusa and SOF-ELK into my rapid endpoint investigation workflow (β€œREIW”)!Β 

The post Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 2) appeared first on Black Hills Information Security, Inc..

Stop Spoofing Yourself! Disabling M365 Direct Send

By: BHIS
20 August 2025 at 16:00

Remember the good β€˜ol days of Zip drives, Winamp, the advent of β€œOffice 365,” and copy machines that didn’t understand email authentication? Okay, maybe they weren’t so good! For a […]

The post Stop Spoofing Yourself! Disabling M365 Direct Send appeared first on Black Hills Information Security, Inc..

DNS Triage Cheatsheet

By: BHIS
6 August 2025 at 17:00

DNS Triage is a reconnaissance tool that finds information about an organization's infrastructure, software, and third-party services as fast as possible. The goal of DNS Triage is not to exhaustively find every technology asset that exists on the internet. The goal is to find the most commonly abused items of interest for real attackers.

The post DNS Triage Cheatsheet appeared first on Black Hills Information Security, Inc..

Burp Suite Cheatsheet

By: BHIS
6 August 2025 at 17:00

Burp Suite is an intercepting HTTP proxy that can also scan a web-based service for vulnerabilities. A tool like this is indispensable for testing web applications. Burp Suite is written in Java and comes bundled with a JVM, so it works on any operating system you're likely to use.

The post Burp Suite Cheatsheet appeared first on Black Hills Information Security, Inc..

Impacket Cheatsheet

By: BHIS
6 August 2025 at 17:00

Impacket is an extremely useful tool for post exploitation. It is a collection of Python scripts that provides low-level programmatic access to the packets and for some protocols, such as DCOM, Kerberos, SMB1, and MSRPC, the protocol implementation itself.

The post Impacket Cheatsheet appeared first on Black Hills Information Security, Inc..

Wireshark Cheatsheet

By: BHIS
6 August 2025 at 17:00

Wireshark is an incredible tool used to read and analyze network traffic coming in and out of an endpoint. Additionally, it can load previously captured traffic to assist with troubleshooting network issues or analyze malicious traffic to help determine what a threat actor is doing on your network.

The post Wireshark Cheatsheet appeared first on Black Hills Information Security, Inc..

Hashcat Cheatsheet

By: BHIS
6 August 2025 at 17:00

Hashcat is a powerful tool for recovering lost passwords, and, thanks to GPU acceleration, it’s one of the fastest. It works by rapidly trying different password guesses to determine the original password from its scrambled (hashed) version.

The post Hashcat Cheatsheet appeared first on Black Hills Information Security, Inc..

Nmap Cheatsheet

By: BHIS
6 August 2025 at 17:00

Nmap is a powerful open-source tool commonly used by system/network administrators and security professionals to perform network discovery, security auditing, and basic vulnerability assessment.

The post Nmap Cheatsheet appeared first on Black Hills Information Security, Inc..

Netcat (nc) CheatsheetΒ 

By: BHIS
6 August 2025 at 17:00

Netcat is a network utility tool that has earned the nickname "The Swiss Army Knife" of networking. It can be used for file transfers, chat/messaging between systems, port scanning, and much more.

The post Netcat (nc) CheatsheetΒ  appeared first on Black Hills Information Security, Inc..

Detecting ADCS Privilege Escalation

Active Directory Certificate Services (ADCS) is used to manage certificates for systems, users, applications, and more in an enterprise environment. Misconfigurations in ADCS can introduce critical vulnerabilities into an enterprise Active Directory environment.

The post Detecting ADCS Privilege Escalation appeared first on Black Hills Information Security, Inc..

❌