EXECUTIVE SUMMARY
Attackers are using fake voicemail notifications to socially engineer users into installing a legitimate remote management tool, granting attackers persistent remote access to compromised systems. By exploiting trust, routine user behaviour, and signed tools rather than software flaws, the campaign achieves high impact with minimal technical complexity.
- Active Region: Primarily Germany with Global potential
- Affected Sector: Multiple sectors
- Affected Product: Windows systems (abuse of Remotely RMM via malicious BAT files)
- Severity: High
- Published Date: February 05, 2026
TECHNICAL DETAILS
- Target: End-user Windows endpoints in enterprise and personal environments, especially systems where users can execute scripts and where RMM software is not strictly controlled
- Root Cause: Psychological manipulation via realistic voicemail-themed phishing pages combined with “living-off-the-land” abuse of a legitimate Remote Monitoring and Management (RMM) tool to evade traditional security detections
- Prerequisite For Exploitation: The victim must interact with a malicious voicemail-themed landing page and manually execute a downloaded Windows BAT file disguised……



