Kapersky Researchers Warn Google Calendar Users Against New Phishing Attacks

Kapersky Researchers Warn Google Calendar Users Against New Phishing Attacks

Kapersky security researchers have identified a new phishing attack that takes place in Google Calendar. Threat actors send a Google Calendar invitation to a user that contains a malicious link hosting a phishing URL.

Security researchers at Kapersky recently warned Google Calendar users that they may be targeted with a credential-stealing attack by threat actors.

When performing this attack, the threat actors will send a calendar invitation to a user. Unfortunately, that calendar invitation hosts a malicious link to a phishing URL. If the user clicks on the link, the website reached will ask victims to enter their credit card details and add some personal information. The website says that upon completion, the user will win prize money, but instead, the information is delivered to a scammer.

Maria Vergelis, a security researcher at Kaspersky said that the “calendar scam” has the potential to be effective and dangerous, given the fact users are used to receiving phishing attacks through email or messaging apps, not their calendar app. She also said that at the current moment though, the scam would need to become more elaborate to be overly convincing.

“But this may not be the case when it comes to the Calendar app, which has a main purpose to organize information rather than transfer it,” Vergelis said. “So far, the sample we’ve seen contains text displaying an obviously weird offer, but as it happens, every simple scheme becomes more elaborate and trickier with time.”

Luckily, the app feature that allows scammers to attempt this form of phishing can be easily disabled.

Kapersky researchers advise to “Turn off the automatic adding of invitations to your calendar. To do so, open Google Calendar, click the settings Gear Icon, then on Event Settings. For the ‘automatically add invitations’ option, click on the dropdown menu and select ‘No, only show invitations to which I’ve responded’. Below this, in the View Options section, make sure ‘Show declined events’ is NOT checked, unless you specifically wish to view these.”

Although the scam is not highly developed yet, it still poses a serious risk to those who could fall victim to the attack. In addition, the attack has room to grow into a much more convincible and less obvious threat.

About the Author

Kaitlyn DeHaven is the Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.