Invitation to Trouble: The Rise of Calendar Phishing Attacks
A new phishing tactic involving fake Microsoft and Google Calendar invites has been identified, aimed at stealing login credentials. These sophisticated attacks mimic designs from well-known platforms, exploiting routine business activities like scheduling meetings. Threat actors use email spoofing and create fake urgent calendar invitations to deceive employees. The phishing emails often contain buttons or links that redirect to fake login pages, closely resembling official Microsoft or Google login screens. The campaigns exploit the popularity of calendar invitations in corporate environments, allowing attackers to gather sensitive information if users are not vigilant. To prevent falling victim to these attacks, it is crucial to verify the authenticity of calendar invites, carefully check sender details, and avoid clicking suspicious links from unknown senders.
AI Analysis
Technical Summary
This emerging phishing campaign exploits the widespread use of Microsoft and Google Calendar invites within corporate environments by sending fake calendar invitations designed to steal login credentials. The attackers employ email spoofing techniques to impersonate trusted senders and create a sense of urgency with fake meeting requests, increasing the likelihood of user interaction. The phishing emails contain embedded links or buttons that redirect victims to fraudulent login pages that closely mimic the official Microsoft or Google authentication portals, thereby deceiving users into submitting their credentials. The campaign leverages the routine and trusted nature of calendar invites to bypass typical user skepticism and security controls. Multiple malicious domains and IP addresses have been identified as part of the infrastructure supporting these attacks, indicating a coordinated effort. Although no direct software vulnerabilities are exploited, the campaign relies heavily on social engineering tactics (MITRE ATT&CK techniques T1566, T1204, T1036) and credential theft (T1078). The threat actors have not been publicly identified, and no known exploits in the wild have been reported to date. The campaign's sophistication lies in its mimicry of legitimate platforms and exploitation of business workflows, making detection challenging without user awareness and technical controls. References include detailed analysis from Cofense and AlienVault OTX. The threat is ongoing and requires proactive defense measures.
Potential Impact
The primary impact of this calendar phishing campaign is the compromise of user credentials for Microsoft and Google accounts, which can lead to unauthorized access to corporate email, documents, and other sensitive resources. Credential theft can facilitate further attacks such as business email compromise (BEC), data exfiltration, lateral movement within networks, and deployment of malware or ransomware. Organizations relying heavily on Microsoft 365 or Google Workspace are particularly at risk, as compromised credentials can undermine the security of cloud services and collaboration tools. The social engineering nature of the attack means that even well-secured environments can be vulnerable if users are not adequately trained. The campaign can disrupt business operations, cause financial losses, and damage organizational reputation. Additionally, stolen credentials may be sold or used in subsequent attacks, increasing the long-term risk. The medium severity rating reflects the significant potential for harm balanced against the requirement for user interaction and the absence of direct exploitation of software vulnerabilities.
Mitigation Recommendations
To mitigate this threat, organizations should implement targeted user awareness training focusing on the risks of calendar invite phishing and the importance of verifying sender details and meeting legitimacy. Deploy advanced email filtering solutions capable of detecting and blocking spoofed emails and malicious links, including domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM enforcement to reduce email spoofing. Enable multi-factor authentication (MFA) on all user accounts to limit the impact of credential compromise. Configure calendar applications to restrict automatic addition of calendar invites from unknown senders or to flag such invites for user review. Employ URL filtering and sandboxing technologies to detect and block access to known phishing domains and URLs identified in this campaign. Regularly update threat intelligence feeds with indicators of compromise (IOCs) such as the listed malicious domains and IP addresses to enhance detection capabilities. Conduct phishing simulations to test and reinforce employee vigilance. Finally, establish incident response procedures to quickly address suspected credential theft and unauthorized access.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, Japan, Netherlands, Singapore
Indicators of Compromise
- ip: 185.208.158.92
- url: http://135947.lachinadragon.com/
- url: http://6612271478.sbs/google.php
- url: http://a.insgly.net/api/trk?id=emailclick&i=660735&eid=156538024&url=hXXps://abramge.com.br/drive/itpresented
- url: http://abramge.com.br/drive/itpresented//
- url: http://d60c1a.startprogrammingnowbook.com/?auth=2&qrc=ZWxzLmZ&sso_reload=true
- url: http://itsleannepelosi.com/?sjzkrkrp
- url: http://oceanlist.net/?&em=
- domain: 6612271478.sbs
- domain: abramge.com.br
- domain: itsleannepelosi.com
- domain: oceanlist.net
- domain: 135947.lachinadragon.com
- domain: a.insgly.net
- domain: d60c1a.startprogrammingnowbook.com
Invitation to Trouble: The Rise of Calendar Phishing Attacks
Description
A new phishing tactic involving fake Microsoft and Google Calendar invites has been identified, aimed at stealing login credentials. These sophisticated attacks mimic designs from well-known platforms, exploiting routine business activities like scheduling meetings. Threat actors use email spoofing and create fake urgent calendar invitations to deceive employees. The phishing emails often contain buttons or links that redirect to fake login pages, closely resembling official Microsoft or Google login screens. The campaigns exploit the popularity of calendar invitations in corporate environments, allowing attackers to gather sensitive information if users are not vigilant. To prevent falling victim to these attacks, it is crucial to verify the authenticity of calendar invites, carefully check sender details, and avoid clicking suspicious links from unknown senders.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This emerging phishing campaign exploits the widespread use of Microsoft and Google Calendar invites within corporate environments by sending fake calendar invitations designed to steal login credentials. The attackers employ email spoofing techniques to impersonate trusted senders and create a sense of urgency with fake meeting requests, increasing the likelihood of user interaction. The phishing emails contain embedded links or buttons that redirect victims to fraudulent login pages that closely mimic the official Microsoft or Google authentication portals, thereby deceiving users into submitting their credentials. The campaign leverages the routine and trusted nature of calendar invites to bypass typical user skepticism and security controls. Multiple malicious domains and IP addresses have been identified as part of the infrastructure supporting these attacks, indicating a coordinated effort. Although no direct software vulnerabilities are exploited, the campaign relies heavily on social engineering tactics (MITRE ATT&CK techniques T1566, T1204, T1036) and credential theft (T1078). The threat actors have not been publicly identified, and no known exploits in the wild have been reported to date. The campaign's sophistication lies in its mimicry of legitimate platforms and exploitation of business workflows, making detection challenging without user awareness and technical controls. References include detailed analysis from Cofense and AlienVault OTX. The threat is ongoing and requires proactive defense measures.
Potential Impact
The primary impact of this calendar phishing campaign is the compromise of user credentials for Microsoft and Google accounts, which can lead to unauthorized access to corporate email, documents, and other sensitive resources. Credential theft can facilitate further attacks such as business email compromise (BEC), data exfiltration, lateral movement within networks, and deployment of malware or ransomware. Organizations relying heavily on Microsoft 365 or Google Workspace are particularly at risk, as compromised credentials can undermine the security of cloud services and collaboration tools. The social engineering nature of the attack means that even well-secured environments can be vulnerable if users are not adequately trained. The campaign can disrupt business operations, cause financial losses, and damage organizational reputation. Additionally, stolen credentials may be sold or used in subsequent attacks, increasing the long-term risk. The medium severity rating reflects the significant potential for harm balanced against the requirement for user interaction and the absence of direct exploitation of software vulnerabilities.
Mitigation Recommendations
To mitigate this threat, organizations should implement targeted user awareness training focusing on the risks of calendar invite phishing and the importance of verifying sender details and meeting legitimacy. Deploy advanced email filtering solutions capable of detecting and blocking spoofed emails and malicious links, including domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM enforcement to reduce email spoofing. Enable multi-factor authentication (MFA) on all user accounts to limit the impact of credential compromise. Configure calendar applications to restrict automatic addition of calendar invites from unknown senders or to flag such invites for user review. Employ URL filtering and sandboxing technologies to detect and block access to known phishing domains and URLs identified in this campaign. Regularly update threat intelligence feeds with indicators of compromise (IOCs) such as the listed malicious domains and IP addresses to enhance detection capabilities. Conduct phishing simulations to test and reinforce employee vigilance. Finally, establish incident response procedures to quickly address suspected credential theft and unauthorized access.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cofense.com/blog/invitation-to-trouble-the-rise-of-calendar-phishing-attacks"]
- Adversary
- null
- Pulse Id
- 69972ba1adf91cc8babfab81
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip185.208.158.92 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://135947.lachinadragon.com/ | — | |
urlhttp://6612271478.sbs/google.php | — | |
urlhttp://a.insgly.net/api/trk?id=emailclick&i=660735&eid=156538024&url=hXXps://abramge.com.br/drive/itpresented | — | |
urlhttp://abramge.com.br/drive/itpresented// | — | |
urlhttp://d60c1a.startprogrammingnowbook.com/?auth=2&qrc=ZWxzLmZ&sso_reload=true | — | |
urlhttp://itsleannepelosi.com/?sjzkrkrp | — | |
urlhttp://oceanlist.net/?&em= | — |
Domain
| Value | Description | Copy |
|---|---|---|
domain6612271478.sbs | — | |
domainabramge.com.br | — | |
domainitsleannepelosi.com | — | |
domainoceanlist.net | — | |
domain135947.lachinadragon.com | — | |
domaina.insgly.net | — | |
domaind60c1a.startprogrammingnowbook.com | — |
Threat ID: 69974fe8d7880ec89b065bbb
Added to database: 2/19/2026, 6:01:12 PM
Last enriched: 2/19/2026, 6:17:40 PM
Last updated: 4/6/2026, 12:56:56 AM
Views: 356
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.