Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Invitation to Trouble: The Rise of Calendar Phishing Attacks

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 15:26:25 UTC)
Source: AlienVault OTX General

Description

A new phishing campaign leverages fake Microsoft and Google Calendar invitations to steal user credentials. Attackers use email spoofing to send urgent-looking calendar invites that mimic legitimate corporate meeting requests. These invites contain links or buttons redirecting victims to counterfeit login pages resembling official Microsoft or Google portals. The tactic exploits the routine nature of calendar invites in business environments to bypass user suspicion. If users click and enter credentials, attackers gain unauthorized access to sensitive accounts. The campaign targets corporate users globally, emphasizing the need for vigilance in verifying sender authenticity and avoiding suspicious links. Indicators include multiple malicious domains and IP addresses used to host phishing pages. No known exploits in the wild have been reported yet, but the threat is active and evolving. Organizations should educate employees and implement email filtering to mitigate risk. The threat is assessed as medium severity due to its social engineering nature and potential for credential compromise.

AI-Powered Analysis

AILast updated: 02/19/2026, 18:17:40 UTC

Technical Analysis

This emerging phishing campaign exploits the widespread use of Microsoft and Google Calendar invites within corporate environments by sending fake calendar invitations designed to steal login credentials. The attackers employ email spoofing techniques to impersonate trusted senders and create a sense of urgency with fake meeting requests, increasing the likelihood of user interaction. The phishing emails contain embedded links or buttons that redirect victims to fraudulent login pages that closely mimic the official Microsoft or Google authentication portals, thereby deceiving users into submitting their credentials. The campaign leverages the routine and trusted nature of calendar invites to bypass typical user skepticism and security controls. Multiple malicious domains and IP addresses have been identified as part of the infrastructure supporting these attacks, indicating a coordinated effort. Although no direct software vulnerabilities are exploited, the campaign relies heavily on social engineering tactics (MITRE ATT&CK techniques T1566, T1204, T1036) and credential theft (T1078). The threat actors have not been publicly identified, and no known exploits in the wild have been reported to date. The campaign's sophistication lies in its mimicry of legitimate platforms and exploitation of business workflows, making detection challenging without user awareness and technical controls. References include detailed analysis from Cofense and AlienVault OTX. The threat is ongoing and requires proactive defense measures.

Potential Impact

The primary impact of this calendar phishing campaign is the compromise of user credentials for Microsoft and Google accounts, which can lead to unauthorized access to corporate email, documents, and other sensitive resources. Credential theft can facilitate further attacks such as business email compromise (BEC), data exfiltration, lateral movement within networks, and deployment of malware or ransomware. Organizations relying heavily on Microsoft 365 or Google Workspace are particularly at risk, as compromised credentials can undermine the security of cloud services and collaboration tools. The social engineering nature of the attack means that even well-secured environments can be vulnerable if users are not adequately trained. The campaign can disrupt business operations, cause financial losses, and damage organizational reputation. Additionally, stolen credentials may be sold or used in subsequent attacks, increasing the long-term risk. The medium severity rating reflects the significant potential for harm balanced against the requirement for user interaction and the absence of direct exploitation of software vulnerabilities.

Mitigation Recommendations

To mitigate this threat, organizations should implement targeted user awareness training focusing on the risks of calendar invite phishing and the importance of verifying sender details and meeting legitimacy. Deploy advanced email filtering solutions capable of detecting and blocking spoofed emails and malicious links, including domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM enforcement to reduce email spoofing. Enable multi-factor authentication (MFA) on all user accounts to limit the impact of credential compromise. Configure calendar applications to restrict automatic addition of calendar invites from unknown senders or to flag such invites for user review. Employ URL filtering and sandboxing technologies to detect and block access to known phishing domains and URLs identified in this campaign. Regularly update threat intelligence feeds with indicators of compromise (IOCs) such as the listed malicious domains and IP addresses to enhance detection capabilities. Conduct phishing simulations to test and reinforce employee vigilance. Finally, establish incident response procedures to quickly address suspected credential theft and unauthorized access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://cofense.com/blog/invitation-to-trouble-the-rise-of-calendar-phishing-attacks"]
Adversary
null
Pulse Id
69972ba1adf91cc8babfab81
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip185.208.158.92

Url

ValueDescriptionCopy
urlhttp://135947.lachinadragon.com/
urlhttp://6612271478.sbs/google.php
urlhttp://a.insgly.net/api/trk?id=emailclick&i=660735&eid=156538024&url=hXXps://abramge.com.br/drive/itpresented
urlhttp://abramge.com.br/drive/itpresented//
urlhttp://d60c1a.startprogrammingnowbook.com/?auth=2&qrc=ZWxzLmZ&sso_reload=true
urlhttp://itsleannepelosi.com/?sjzkrkrp
urlhttp://oceanlist.net/?&em=

Domain

ValueDescriptionCopy
domain6612271478.sbs
domainabramge.com.br
domainitsleannepelosi.com
domainoceanlist.net
domain135947.lachinadragon.com
domaina.insgly.net
domaind60c1a.startprogrammingnowbook.com

Threat ID: 69974fe8d7880ec89b065bbb

Added to database: 2/19/2026, 6:01:12 PM

Last enriched: 2/19/2026, 6:17:40 PM

Last updated: 2/20/2026, 3:57:26 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats