How fake party invitations are being used to install remote access tools
âYouâre invited!âÂ
It sounds friendly, familiar and quite harmless. But in a scam we recently spotted, that simple phrase is being used to trick victims into installing a full remote access tool on their Windows computersâgiving attackers complete control of the system.Â
What appears to be a casual party or event invitation leads to the silent installation of ScreenConnect, a legitimate remote support tool quietly installed in the background and abused by attackers.Â
Hereâs how the scam works, why itâs effective, and how to protect yourself.Â
The email: A party invitationÂ
Victims receive an email framed as a personal invitationâoften written to look like it came from a friend or acquaintance. The message is deliberately informal and social, lowering suspicion and encouraging quick action.Â
In the screenshot below, the email arrived from a friend whose email account had been hacked, but it could just as easily come from a sender you donât know.
So far, weâve only seen this campaign targeting people in the UK, but thereâs nothing stopping it from expanding elsewhere.Â
Clicking the link in the email leads to a polished invitation page hosted on an attacker-controlled domain.Â

The invite: The landing page that leads to an installerÂ
The landing page leans heavily into the party theme, but instead of showing event details, the page nudges the user toward opening a file. None of them look dangerous on their own, but together they keep the user focused on the âinvitationâ file:Â
- A bold âYouâre Invited!â headlineÂ
- The suggestion that a friend had sent the invitationÂ
- A message saying the invitation is best viewed on a Windows laptop or desktop
- A countdown suggesting your invitation is already âdownloadingâÂ
- A message implying urgency and social proof (âI opened mine and it was so easy!â)Â
Within seconds, the browser is redirected to download RSVPPartyInvitationCard.msiÂ
The page even triggers the download automatically to keep the victim moving forward without stopping to think.Â
This MSI file isnât an invitation. Itâs an installer.Â

The guest: What the MSI actually doesÂ
When the user opens the MSI file, it launches msiexec.exe and silently installs ScreenConnect Client, a legitimate remote access tool often used by IT support teams. Â
Thereâs no invitation, RSVP form, or calendar entry.Â
What happens instead:Â
- ScreenConnect binaries are installed underÂ
C:\Program Files (x86)\ScreenConnect Client\ - A persistent Windows service is created (for example, ScreenConnect Client 18d1648b87bb3023)Â
- ScreenConnect installs multiple .NET-based componentsÂ
- There is no clear user-facing indication that a remote access tool is being installedÂ
From the victimâs perspective, very little seems to happen. But at this point, the attacker can now remotely access their computer.Â
The after-party: Remote access is establishedÂ
Once installed, the ScreenConnect client initiates encrypted outbound connections to ScreenConnectâs relay servers, including a uniquely assigned instance domain.
That connection gives the attacker the same level of access as a remote IT technician, including the ability to:Â
- See the victimâs screen in real time
- Control the mouse and keyboardÂ
- Upload or download filesÂ
- Keep access even after the computer is restartedÂ
Because ScreenConnect is legitimate software commonly used for remote support, its presence isnât always obvious. On a personal computer, the first signs are often behavioral, such as unexplained cursor movement, windows opening on their own, or a ScreenConnect process the user doesnât remember installing.Â
Why this scam worksÂ
This campaign is effective because it targets normal, predictable human behavior. From a behavioral security standpoint, it exploits our natural curiosity and appears to be a low risk.Â
Most people donât think of invitations as dangerous. Opening one feels passive, like glancing at a flyer or checking a message, not installing software.Â
Even security-aware users are trained to watch out for warnings and pressure. A friendly âyouâre invitedâ message doesnât trigger those alarms.Â
By the time something feels off, the software is already installed.Â
Signs your computer may be affectedÂ
Watch for:Â
- A download or executed file namedÂ
RSVPPartyInvitationCard.msi - An unexpected installation of ScreenConnect ClientÂ
- A Windows service named ScreenConnect Client with random characters Â
- Your computer makes outbound HTTPS connections to ScreenConnect relay domainsÂ
- Your system resolves the invitation-hosting domain used in this campaign, xnyr[.]digitalÂ
How to stay safe Â
This campaign is a reminder that modern attacks often donât break inâtheyâre invited in. Remote access tools give attackers deep control over a system. Acting quickly can limit the damage. Â
For individualsÂ
If you receive an email like this:Â
- Be suspicious of invitations that ask you to download or open softwareÂ
- Never run MSI files from unsolicited emailsÂ
- Verify invitations through another channel before opening anythingÂ
If you already clicked or ran the file:Â Â
- Disconnect from the internet immediatelyÂ
- Check for ScreenConnect and uninstall it if presentÂ
- Run a full security scanÂ
- Change important passwords from a clean, unaffected deviceÂ
For organisations (especially in the UK)Â
- Alert on unauthorized ScreenConnect installations
- Restrict MSI execution where feasibleÂ
- Treat âremote support toolsâ as high-risk software
- Educate users: invitations donât come as installersÂ
This scam works by installing a legitimate remote access tool without clear user intent. Thatâs exactly the gap Malwarebytes is designed to catch.
Malwarebytes now detects newly installed remote access tools and alerts you when one appears on your system. Youâre then given a choice: confirm that the tool is expected and trusted, or remove it if it isnât.
We donât just report on threatsâwe remove them
Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.