Fraudsters are abusing a Google Calendar feature that’s commonly enabled on smartphones to target unsuspecting users with scam offers.

Kaspersky Lab came across the scam campaign after observing unsolicited pop-up calendar notifications targeting some of its mobile users via Gmail in May. Upon taking a closer look, the security firm found that these notifications abused a Gmail feature that’s commonly enabled by default on smartphones: the automatic addition and notification of calendar invitations within the mobile Gmail app. Fraudsters leveraged this capability to display a notification for their invitations on the home screen of each targeted smartphone user. These notifications encouraged users to click on a link included with the invitations.

When a user clicked the link, the attack chain redirected them to a website that offered prize money in exchange for filling out a questionnaire. This survey contained questions designed to steal users’ personal information, including their names, phone numbers and addresses. It also instructed users to complete a “fixing payment” with their credit cards, payment data that the scammers could then abuse to commit credit card fraud.

Calendar-Based Phishing Schemes

This scam campaign was unique in that it leveraged a common feature associated with the mobile Gmail app to deliver phishing calendar invitations. Even so, this was not the first calendar-based phishing scheme in general. All the way back in 2008, Naked Security came across a sample in which digital attackers used Google Calendar invitations to steal credentials. In January 2019, GMX found that calendar spam accounts had grown to account for 7 percent of all digital appointment invitations received by users.

How to Defend Against Mobile-Borne Scam Offers

Security professionals can help defend against mobile-borne scam offers by using ahead-of-threat detection to block malicious domains, including phishing attack landing pages, before they become active in ongoing attacks. Companies should also use ongoing employee awareness training to teach employees about common social engineering techniques.

More from

Vulnerability resolution enhanced by integrations

2 min read - Why speed is of the essence in today's cybersecurity landscape? How are you quickly achieving vulnerability resolution?Identifying vulnerabilities should be part of the daily process within an organization. It's an important piece of maintaining an organization’s security posture. However, the complicated nature of modern technologies — and the pace of change — often make vulnerability management a challenging task.In the past, many organizations had to support manual integration work to get different security systems to ‘talk’ to each other. As…

How I got started: SIEM engineer

2 min read - As careers in cybersecurity become increasingly more specialized, Security Information and Event Management (SIEM) engineers are playing a more prominent role. These professionals are like forensic specialists but are also on the front lines protecting sensitive information from the relentless onslaught of cyber threats. SIEM engineers meticulously monitor, analyze and manage security events and incidents within an organization. They leverage SIEM tools to aggregate and correlate data, enabling them to detect anomalies, identify potential threats and respond swiftly to security…

Tequila OS 2.0: The first forensic Linux distribution in Latin America

3 min read - Incident response teams are stretched thin, and the threats are only intensifying. But new tools are helping bridge the gap for cybersecurity pros in Latin America.IBM Security X-Force Threat Intelligence Index 2023 found that 12% of the security incidents X-force responded to were in Latin America. In comparison, 31% were in the Asia-Pacific, followed by Europe with 28%, North America with 25% and the Middle East with 4%. In the Latin American region, Brazil had 67% of incidents that X-Force…

Cost of a data breach 2023: Geographical breakdowns

4 min read - Data breaches can occur anywhere in the world, but they are historically more common in specific countries. Typically, countries with high internet usage and digital services are more prone to data breaches. To that end, IBM’s Cost of a Data Breach Report 2023 looked at 553 organizations of various sizes across 16 countries and geographic regions, and 17 industries. In the report, the top five costs of a data breach by country or region (measured in USD millions) for 2023…