Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Invitation to Trouble: The Rise of Calendar Phishing Attacks

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 15:26:25 UTC)
Source: AlienVault OTX General

Description

A new phishing tactic involving fake Microsoft and Google Calendar invites has been identified, aimed at stealing login credentials. These sophisticated attacks mimic designs from well-known platforms, exploiting routine business activities like scheduling meetings. Threat actors use email spoofing and create fake urgent calendar invitations to deceive employees. The phishing emails often contain buttons or links that redirect to fake login pages, closely resembling official Microsoft or Google login screens. The campaigns exploit the popularity of calendar invitations in corporate environments, allowing attackers to gather sensitive information if users are not vigilant. To prevent falling victim to these attacks, it is crucial to verify the authenticity of calendar invites, carefully check sender details, and avoid clicking suspicious links from unknown senders.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 18:17:40 UTC

Technical Analysis

This emerging phishing campaign exploits the widespread use of Microsoft and Google Calendar invites within corporate environments by sending fake calendar invitations designed to steal login credentials. The attackers employ email spoofing techniques to impersonate trusted senders and create a sense of urgency with fake meeting requests, increasing the likelihood of user interaction. The phishing emails contain embedded links or buttons that redirect victims to fraudulent login pages that closely mimic the official Microsoft or Google authentication portals, thereby deceiving users into submitting their credentials. The campaign leverages the routine and trusted nature of calendar invites to bypass typical user skepticism and security controls. Multiple malicious domains and IP addresses have been identified as part of the infrastructure supporting these attacks, indicating a coordinated effort. Although no direct software vulnerabilities are exploited, the campaign relies heavily on social engineering tactics (MITRE ATT&CK techniques T1566, T1204, T1036) and credential theft (T1078). The threat actors have not been publicly identified, and no known exploits in the wild have been reported to date. The campaign's sophistication lies in its mimicry of legitimate platforms and exploitation of business workflows, making detection challenging without user awareness and technical controls. References include detailed analysis from Cofense and AlienVault OTX. The threat is ongoing and requires proactive defense measures.

Potential Impact

The primary impact of this calendar phishing campaign is the compromise of user credentials for Microsoft and Google accounts, which can lead to unauthorized access to corporate email, documents, and other sensitive resources. Credential theft can facilitate further attacks such as business email compromise (BEC), data exfiltration, lateral movement within networks, and deployment of malware or ransomware. Organizations relying heavily on Microsoft 365 or Google Workspace are particularly at risk, as compromised credentials can undermine the security of cloud services and collaboration tools. The social engineering nature of the attack means that even well-secured environments can be vulnerable if users are not adequately trained. The campaign can disrupt business operations, cause financial losses, and damage organizational reputation. Additionally, stolen credentials may be sold or used in subsequent attacks, increasing the long-term risk. The medium severity rating reflects the significant potential for harm balanced against the requirement for user interaction and the absence of direct exploitation of software vulnerabilities.

Mitigation Recommendations

To mitigate this threat, organizations should implement targeted user awareness training focusing on the risks of calendar invite phishing and the importance of verifying sender details and meeting legitimacy. Deploy advanced email filtering solutions capable of detecting and blocking spoofed emails and malicious links, including domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM enforcement to reduce email spoofing. Enable multi-factor authentication (MFA) on all user accounts to limit the impact of credential compromise. Configure calendar applications to restrict automatic addition of calendar invites from unknown senders or to flag such invites for user review. Employ URL filtering and sandboxing technologies to detect and block access to known phishing domains and URLs identified in this campaign. Regularly update threat intelligence feeds with indicators of compromise (IOCs) such as the listed malicious domains and IP addresses to enhance detection capabilities. Conduct phishing simulations to test and reinforce employee vigilance. Finally, establish incident response procedures to quickly address suspected credential theft and unauthorized access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://cofense.com/blog/invitation-to-trouble-the-rise-of-calendar-phishing-attacks"]
Adversary
null
Pulse Id
69972ba1adf91cc8babfab81
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip185.208.158.92

Url

ValueDescriptionCopy
urlhttp://135947.lachinadragon.com/
urlhttp://6612271478.sbs/google.php
urlhttp://a.insgly.net/api/trk?id=emailclick&i=660735&eid=156538024&url=hXXps://abramge.com.br/drive/itpresented
urlhttp://abramge.com.br/drive/itpresented//
urlhttp://d60c1a.startprogrammingnowbook.com/?auth=2&qrc=ZWxzLmZ&sso_reload=true
urlhttp://itsleannepelosi.com/?sjzkrkrp
urlhttp://oceanlist.net/?&em=

Domain

ValueDescriptionCopy
domain6612271478.sbs
domainabramge.com.br
domainitsleannepelosi.com
domainoceanlist.net
domain135947.lachinadragon.com
domaina.insgly.net
domaind60c1a.startprogrammingnowbook.com

Threat ID: 69974fe8d7880ec89b065bbb

Added to database: 2/19/2026, 6:01:12 PM

Last enriched: 2/19/2026, 6:17:40 PM

Last updated: 4/6/2026, 12:56:56 AM

Views: 356

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses