New threat: Phishing via Google Calendar threatens both companies and consumers

A new wave of phishing attacks exploiting Google Calendar is bypassing traditional security measures and threatening businesses and individuals alike.

The scam appears to be legitimate calendar invitations and has already hit over 300 organizations globally. Its purpose is to steal sensitive data through links to malicious web pages, which makes it necessary to take proper precautions now.

Cyber ​​security company Check Point Software Technologies has just identified a new threat that specifically uses Google Calendar. In recent months, cybercriminals have thus intensified their use of Google Calendar as a platform for phishing attacks. Fake invitations are sent with links that take users to phishing pages that look like Google forms, where users are asked to enter login information, credit card data, etc. They then risk becoming victims of identity theft or hacking.

Once the sensitive data is compromised, it is typically used for financial fraud such as credit card fraud, unauthorized transactions or other illegal activities. The stolen information can also be used to bypass security measures on other accounts, creating a chain reaction of further compromises. The method is effective because it takes advantage of Google Calendar’s built-in features, which many rely on, making the attacks difficult to detect.

“The particularly dangerous thing about this phishing campaign is that it exploits trust in Google’s services. The attacks are also becoming even more sophisticated as the cybercriminals use artificial intelligence to create convincing content in the fake meeting invitations,” points out Balder Borup, Security Engineer at Check Point Software Technologies Denmark

A holistic approach to cyber security

Phishing campaigns are on the rise and increasingly difficult to detect. Therefore, according to Balder Borup, it is important that both consumers and companies are cautious and skeptical.

“The wave of phishing attacks via Google Calendar shows how vulnerable both businesses and individuals can be to creative and targeted cyber threats. Once compromised, sensitive data can lead to identity theft, financial fraud or the loss of confidential business information. The attacks not only create financial challenges, but also considerable stress and uncertainty for the affected victims,” ​​says Balder Borup and concludes:

“This development emphasizes how important it is to combine technological security solutions with increased awareness of the threats. Both companies and private users of Google Calendar can minimize the risk of becoming victims by getting to know how the cybercriminals work and from there take proactive and preventive measures.”

How to protect yourself from phishing scams

To counter the threats posed by phishing attacks, Check Point recommends the following important steps to take to protect both businesses and private users:

For companies:
  • Advanced email security solutions: Use an effective email security system that can identify and block advanced phishing attacks, even when the criminals are leveraging trusted platforms like Google Calendar
  • Multifactor authentication (MFA): Add an extra layer of security so hackers can’t gain access even if your passwords are stolen.
  • Monitoring with AI: Use advanced tools to detect suspicious behavior, such as attempts to log in without permission or visits to dangerous sites.
  • Behavioral analysis: Implement tools to detect suspicious login attempts or unusual activities, including navigation to cryptocurrency-related pages.
The following advice also applies to private users:
  • Check invitations carefully: If a calendar invitation asks you to do something unusual, such as CAPTCHA, so be extra careful.
  • Beware of suspicious links: Hover over the link to check where it goes, or type the URL manually in the browser.
  • Enable two-factor authentication: Make your accounts extra secure by using two-factor authentication. If your user information is compromised, two-factor security can prevent criminals from accessing a given account.
Protection with advanced email security: Harmony Email & Collaboration

Harmony Email & Collaboration is an advanced solution designed to protect against the most sophisticated phishing attacks. The solution identifies and blocks malicious links in both calendar invitations and emails before they reach users, preventing sensitive information from being compromised.

Read more herabout how Harmony Email & Collaboration makes it possible to identify and stop threats at an early stage.

Om Check Point Software Technologies

Check Point Software Technologies (https://www.checkpoint.com) is one of the world’s leading providers of AI-powered cloud-based cybersecurity platforms, protecting more than 100,000 organizations worldwide. Check Point harnesses the power of AI to improve efficiency and accuracy in cybersecurity with the company’s Infinity Platform, which ensures proactive threat prevention and faster response times with one of the industry’s leading detection rates. The comprehensive platform includes technology delivered via the cloud and consists of: Check Point Harmony for securing the user workplace; Check Point CloudGuard for securing clouds; Check Point Quantum for network protection and Check Point Infinity Platform Services for security management and services for over 100,000 organizations of all sizes.

Source: it-kanalen.dk