Voicemail Trap: German-Language Voicemail Lure Leads to Remote Access

Research, Threat Intelligence

Executive Summary

  • Fake voicemail messages with bank themed subdomains direct targets to a convincing “listen to your message” experience designed to look routine and trustworthy.
  • The flow relies on social engineering rather than exploits, using lures to persuade users to approve installation steps.
  • The end goal is installation of an RMM (remote monitoring and management) tool, enrolling the device into an attacker-controlled environment.

Introduction

Censys observed 86 web properties delivering German-language voicemail themed lures that lead victims to download a BAT file, play a decoy audio message, and install Remotely RMM (remote monitoring and management). This emerging threat was first noted by Censys researchers on 01/12/26.

Attack Chain Analysis

1. Voicemail Landing Page

Victims are directed to a compromised web property presenting a German-language voicemail themed landing page. The page implies that a new voice message is available and prompts the user to listen to the audio. Visual elements and wording are minimal and functional, reinforcing the appearance of a routine notification rather than a security event.

2. BAT File Delivery and Execution

Interaction with the landing page results in the download of a Windows BAT file presented as a media or audio-related update. When executed, the script displays benign update messaging and instructs the user to approve any security prompts. This stage conditions the user to expect normal system dialogs and minimizes suspicion.

Console output observed after execution of voicemail.bat

3. Decoy Audio Playback

As the script runs, an audio file is loaded from cloud-hosted storage (AWS) and opened in a web browser in a minimized window. Although largely hidden from view during execution, the audio reinforces the voicemail narrative and provides sensory confirmation that the action taken by the user was legitimate.

Audio lure opened in a web browser, showing the voicemail audio file hosted on Amazon S3.

4. RMM Installation and Enrollment

While the audio plays, the script installs Remotely RMM, a legitimate remote monitoring and management tool. The audio is in English and contextually irrelevant. The installation enrolls the victim system into an attacker-controlled environment, enabling persistent remote access and management.

Remotely admin portal running on the C2.
Remotely git project

The certificate data for the C2 in the Censys Platform

5. Post-Installation Access

Once installed, the RMM agent persists on the system and allows the operator to interact with the host as needed. Analysis of the client reveals communication to hxxps://remotely[.]billbutterworth[.]com/api/devices. Follow-on deployment, payloads, or additional tooling is unknown at this time.

Conclusion

This activity uses a simple, recognizable lure to get victims to install an RMM tool under attacker control. The voicemail theme and decoy audio are there to make the experience feel legitimate while the installation happens. The result is attacker persistence and the ability to execute follow-on tactics(lateral movement, data exfiltration, etc) in alignment with their objectives.

Artifact Appendix

voicemail.bat – https://gist.github.com/anorthern-censys/013301a68194aab41223072db646166d
Install-Remotely.ps1 – https://gist.github.com/anorthern-censys/70d659039f13da4d17a9b2bf253d1e96

IOC Table

Stage 1: Voicemail Landing Pages (Web Lures)

TypeIndicator
Domainbannerbank[.]cadillac[.]ps
Domainwww[.]bannerbank[.]cadillac[.]ps
Domainsmbk[.]cadillac[.]ps
Domainwww[.]smbk[.]cadillac[.]ps
Domainallsouthfcu[.]cadillac[.]ps
Domainwww[.]allsouthfcu[.]cadillac[.]ps
Domaincoastalccu[.]cadillac[.]ps
Domainwww[.]coastalccu[.]cadillac[.]ps
Domainroyalcu[.]cadillac[.]ps
Domainwww[.]royalcu[.]cadillac[.]ps
Domainulstersavingsbnk[.]cadillac[.]ps
Domainwww[.]ulstersavingsbnk[.]cadillac[.]ps
Domainrallycuu[.]cadillac[.]ps
Domainwww[.]rallycuu[.]cadillac[.]ps
Domainlandmarkcuu[.]cadillac[.]ps
Domainwww[.]landmarkcuu[.]cadillac[.]ps
Domainvaccu[.]cadillac[.]ps
Domainwww[.]vaccu[.]cadillac[.]ps
Domainblazeccu[.]cadillac[.]ps
Domainwww[.]blazeccu[.]cadillac[.]ps

(Representative sample; observed across 86 total properties under *.cadillac[.]ps.)

Stage 2: Decoy Audio (Cloud-Hosted)

TypeIndicator
URLhxxps://messagecentermywesternbutkectlistvmailspecial[.]s3[.]eu-west-1[.]amazonaws[.]com/femail1757597626625014171+(mp3cut[.]net)+(1)[.]wav

Stage 3: BAT Delivery (User-Executed)

TypeIndicatorSHA256
Filevoicemail[.]batcd2add8e4a9e623ae4dbfd0350bd6f881c1343a979c723d8a5a8101e99ca4c17

Stage 4: Installer Script Delivery

TypeIndicatorSHA256
URLhxxps://remotely[.]billbutterworth[.]com/api/ClientDownloads/WindowsInstaller/Install-Remotely[.]ps1N/A
Domainremotely[.]billbutterworth[.]comN/A
FileInstall-Remotely[.]ps12c01ccac4e5b444ef525d0ce3a84939d2c12d125235cba9265b5650c1c9f9ef2

Stage 5: RMM Client Payload

TypeIndicatorSHA256
URLhxxps://remotely[.]billbutterworth[.]com/Content/Remotely-Win-x64[.]zipN/A
FileRemotely-Win-x64[.]zipbb50fcfccfc361c79a8a765c57b43c490490e31b00d18cbe90f22cebb34a79b5
URLhxxps://remotely[.]billbutterworth[.]com/Content/Remotely-Win-x86[.]zipN/A

Stage 6: RMM Core Binaries (Inside Remotely-Win-x64.zip)

TypeZIP PathSHA256
FileRemotely_Agent.exe97aaa866b285a518d99a99921f1e85f48ca74b49aa3dff0129c6cbfabf33aa5e
FileRemotely_Agent.dll31b891e0f07058feb3b175fe5347682676448581e652d5d555f6d556e60d1bb6
FileDesktop\Remotely_Desktop.exe7a434ad209d7166c04ede9668b55b63936c267e1df7bb62403a869288552c775
FileDesktop\Remotely_Desktop.dlld14a3c204c45915605b8d63721611a28980fcc77fbee65227a98fb3c4ade685c

Stage 7: Enrollment / Operator Control Plane

TypeIndicator
URLhxxps://remotely[.]billbutterworth[.]com/api/devices
Organization ID63d4dd57-c2c3-47b4-82d7-a7406e9744d0
Device Groupdemoforce

Stage 8: On-Host Artifacts (Post-Install)

TypeIndicator
ServiceRemotely_Service
PathC:\Program Files\Remotely\
FileC:\Program Files\Remotely\ConnectionInfo[.]json
Log%TEMP%\Remotely_Install[.]txt

Subscribe to our blog