Invitation to Trouble: The Rise of Calendar Phishing Attacks
A new phishing campaign leverages fake Microsoft and Google Calendar invitations to steal user credentials. Attackers use email spoofing to send urgent-looking calendar invites that mimic legitimate corporate meeting requests. These invites contain links or buttons redirecting victims to counterfeit login pages resembling official Microsoft or Google portals. The tactic exploits the routine nature of calendar invites in business environments to bypass user suspicion. If users click and enter credentials, attackers gain unauthorized access to sensitive accounts. The campaign targets corporate users globally, emphasizing the need for vigilance in verifying sender authenticity and avoiding suspicious links. Indicators include multiple malicious domains and IP addresses used to host phishing pages. No known exploits in the wild have been reported yet, but the threat is active and evolving. Organizations should educate employees and implement email filtering to mitigate risk. The threat is assessed as medium severity due to its social engineering nature and potential for credential compromise.
AI Analysis
Technical Summary
This emerging phishing campaign exploits the widespread use of Microsoft and Google Calendar invites within corporate environments by sending fake calendar invitations designed to steal login credentials. The attackers employ email spoofing techniques to impersonate trusted senders and create a sense of urgency with fake meeting requests, increasing the likelihood of user interaction. The phishing emails contain embedded links or buttons that redirect victims to fraudulent login pages that closely mimic the official Microsoft or Google authentication portals, thereby deceiving users into submitting their credentials. The campaign leverages the routine and trusted nature of calendar invites to bypass typical user skepticism and security controls. Multiple malicious domains and IP addresses have been identified as part of the infrastructure supporting these attacks, indicating a coordinated effort. Although no direct software vulnerabilities are exploited, the campaign relies heavily on social engineering tactics (MITRE ATT&CK techniques T1566, T1204, T1036) and credential theft (T1078). The threat actors have not been publicly identified, and no known exploits in the wild have been reported to date. The campaign's sophistication lies in its mimicry of legitimate platforms and exploitation of business workflows, making detection challenging without user awareness and technical controls. References include detailed analysis from Cofense and AlienVault OTX. The threat is ongoing and requires proactive defense measures.
Potential Impact
The primary impact of this calendar phishing campaign is the compromise of user credentials for Microsoft and Google accounts, which can lead to unauthorized access to corporate email, documents, and other sensitive resources. Credential theft can facilitate further attacks such as business email compromise (BEC), data exfiltration, lateral movement within networks, and deployment of malware or ransomware. Organizations relying heavily on Microsoft 365 or Google Workspace are particularly at risk, as compromised credentials can undermine the security of cloud services and collaboration tools. The social engineering nature of the attack means that even well-secured environments can be vulnerable if users are not adequately trained. The campaign can disrupt business operations, cause financial losses, and damage organizational reputation. Additionally, stolen credentials may be sold or used in subsequent attacks, increasing the long-term risk. The medium severity rating reflects the significant potential for harm balanced against the requirement for user interaction and the absence of direct exploitation of software vulnerabilities.
Mitigation Recommendations
To mitigate this threat, organizations should implement targeted user awareness training focusing on the risks of calendar invite phishing and the importance of verifying sender details and meeting legitimacy. Deploy advanced email filtering solutions capable of detecting and blocking spoofed emails and malicious links, including domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM enforcement to reduce email spoofing. Enable multi-factor authentication (MFA) on all user accounts to limit the impact of credential compromise. Configure calendar applications to restrict automatic addition of calendar invites from unknown senders or to flag such invites for user review. Employ URL filtering and sandboxing technologies to detect and block access to known phishing domains and URLs identified in this campaign. Regularly update threat intelligence feeds with indicators of compromise (IOCs) such as the listed malicious domains and IP addresses to enhance detection capabilities. Conduct phishing simulations to test and reinforce employee vigilance. Finally, establish incident response procedures to quickly address suspected credential theft and unauthorized access.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, Japan, Netherlands, Singapore
Indicators of Compromise
- ip: 185.208.158.92
- url: http://135947.lachinadragon.com/
- url: http://6612271478.sbs/google.php
- url: http://a.insgly.net/api/trk?id=emailclick&i=660735&eid=156538024&url=hXXps://abramge.com.br/drive/itpresented
- url: http://abramge.com.br/drive/itpresented//
- url: http://d60c1a.startprogrammingnowbook.com/?auth=2&qrc=ZWxzLmZ&sso_reload=true
- url: http://itsleannepelosi.com/?sjzkrkrp
- url: http://oceanlist.net/?&em=
- domain: 6612271478.sbs
- domain: abramge.com.br
- domain: itsleannepelosi.com
- domain: oceanlist.net
- domain: 135947.lachinadragon.com
- domain: a.insgly.net
- domain: d60c1a.startprogrammingnowbook.com
Invitation to Trouble: The Rise of Calendar Phishing Attacks
Description
A new phishing campaign leverages fake Microsoft and Google Calendar invitations to steal user credentials. Attackers use email spoofing to send urgent-looking calendar invites that mimic legitimate corporate meeting requests. These invites contain links or buttons redirecting victims to counterfeit login pages resembling official Microsoft or Google portals. The tactic exploits the routine nature of calendar invites in business environments to bypass user suspicion. If users click and enter credentials, attackers gain unauthorized access to sensitive accounts. The campaign targets corporate users globally, emphasizing the need for vigilance in verifying sender authenticity and avoiding suspicious links. Indicators include multiple malicious domains and IP addresses used to host phishing pages. No known exploits in the wild have been reported yet, but the threat is active and evolving. Organizations should educate employees and implement email filtering to mitigate risk. The threat is assessed as medium severity due to its social engineering nature and potential for credential compromise.
AI-Powered Analysis
Technical Analysis
This emerging phishing campaign exploits the widespread use of Microsoft and Google Calendar invites within corporate environments by sending fake calendar invitations designed to steal login credentials. The attackers employ email spoofing techniques to impersonate trusted senders and create a sense of urgency with fake meeting requests, increasing the likelihood of user interaction. The phishing emails contain embedded links or buttons that redirect victims to fraudulent login pages that closely mimic the official Microsoft or Google authentication portals, thereby deceiving users into submitting their credentials. The campaign leverages the routine and trusted nature of calendar invites to bypass typical user skepticism and security controls. Multiple malicious domains and IP addresses have been identified as part of the infrastructure supporting these attacks, indicating a coordinated effort. Although no direct software vulnerabilities are exploited, the campaign relies heavily on social engineering tactics (MITRE ATT&CK techniques T1566, T1204, T1036) and credential theft (T1078). The threat actors have not been publicly identified, and no known exploits in the wild have been reported to date. The campaign's sophistication lies in its mimicry of legitimate platforms and exploitation of business workflows, making detection challenging without user awareness and technical controls. References include detailed analysis from Cofense and AlienVault OTX. The threat is ongoing and requires proactive defense measures.
Potential Impact
The primary impact of this calendar phishing campaign is the compromise of user credentials for Microsoft and Google accounts, which can lead to unauthorized access to corporate email, documents, and other sensitive resources. Credential theft can facilitate further attacks such as business email compromise (BEC), data exfiltration, lateral movement within networks, and deployment of malware or ransomware. Organizations relying heavily on Microsoft 365 or Google Workspace are particularly at risk, as compromised credentials can undermine the security of cloud services and collaboration tools. The social engineering nature of the attack means that even well-secured environments can be vulnerable if users are not adequately trained. The campaign can disrupt business operations, cause financial losses, and damage organizational reputation. Additionally, stolen credentials may be sold or used in subsequent attacks, increasing the long-term risk. The medium severity rating reflects the significant potential for harm balanced against the requirement for user interaction and the absence of direct exploitation of software vulnerabilities.
Mitigation Recommendations
To mitigate this threat, organizations should implement targeted user awareness training focusing on the risks of calendar invite phishing and the importance of verifying sender details and meeting legitimacy. Deploy advanced email filtering solutions capable of detecting and blocking spoofed emails and malicious links, including domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM enforcement to reduce email spoofing. Enable multi-factor authentication (MFA) on all user accounts to limit the impact of credential compromise. Configure calendar applications to restrict automatic addition of calendar invites from unknown senders or to flag such invites for user review. Employ URL filtering and sandboxing technologies to detect and block access to known phishing domains and URLs identified in this campaign. Regularly update threat intelligence feeds with indicators of compromise (IOCs) such as the listed malicious domains and IP addresses to enhance detection capabilities. Conduct phishing simulations to test and reinforce employee vigilance. Finally, establish incident response procedures to quickly address suspected credential theft and unauthorized access.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cofense.com/blog/invitation-to-trouble-the-rise-of-calendar-phishing-attacks"]
- Adversary
- null
- Pulse Id
- 69972ba1adf91cc8babfab81
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip185.208.158.92 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://135947.lachinadragon.com/ | — | |
urlhttp://6612271478.sbs/google.php | — | |
urlhttp://a.insgly.net/api/trk?id=emailclick&i=660735&eid=156538024&url=hXXps://abramge.com.br/drive/itpresented | — | |
urlhttp://abramge.com.br/drive/itpresented// | — | |
urlhttp://d60c1a.startprogrammingnowbook.com/?auth=2&qrc=ZWxzLmZ&sso_reload=true | — | |
urlhttp://itsleannepelosi.com/?sjzkrkrp | — | |
urlhttp://oceanlist.net/?&em= | — |
Domain
| Value | Description | Copy |
|---|---|---|
domain6612271478.sbs | — | |
domainabramge.com.br | — | |
domainitsleannepelosi.com | — | |
domainoceanlist.net | — | |
domain135947.lachinadragon.com | — | |
domaina.insgly.net | — | |
domaind60c1a.startprogrammingnowbook.com | — |
Threat ID: 69974fe8d7880ec89b065bbb
Added to database: 2/19/2026, 6:01:12 PM
Last enriched: 2/19/2026, 6:17:40 PM
Last updated: 2/20/2026, 3:57:26 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
DNS Used to Hide Fake Investment Platform Schemes
MediumBanners, Bots and Butchers: The AI-Driven Long Con in Asia
MediumArkanix Stealer targets a variety of data, offers a MaaS referral program
Medium(Don't) TrustConnect: It's a RAT in an RMM hat
MediumUncovering Malicious OAuth Campaigns in Entra ID
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.