Thursday, August 11, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Phishing attacks exploit free calendar app to steal account credentials

Researcher by Researcher
April 3, 2022
in Cybersecurity
0
Phishing attacks exploit free calendar app to steal account credentials
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


A credential harvesting campaign spotted by INKY at the end of February tried to lure its victims to Calendly, a legitimate and free online calendar app.

Credential harvesting scam lead image.
Image: weerapatkiatdumrong, Getty Images/iStockphoto

Cybercriminals who specialize in phishing attacks like to point people to actual websites as much as possible. Using such sites lends an air of legitimacy to the scam, increasing the odds of tricking the recipients. In a report released Thursday, email security provider INKY describes a recent phishing campaign that took advantage of the Calendly calendar app to harvest sensitive account credentials from unsuspecting victims.

Discovered by INKY toward the end of February, the people behind this particular phishing attack inserted malicious links in event invitations sent through Calendly. One reason the criminals chose Calendly may be because the site allows users to set up free accounts without entering any credit card or payment information. Another possible reason is that users can customize Calendly’s invitation pages, allowing scammers to insert malicious links in them.

SEE: “Browser in the Browser” attacks: A devastating new phishing technique arises (TechRepublic)

To kick off the campaign, the attackers sent out phishing emails from various hijacked accounts. Some 64 INKY customers checked their inboxes only to find these emails with a message of “new documents received” and a link to allegedly view those documents. Clicking on the link would then take the recipient to an event invitation on Calendly.

Credential harvesting campaign spotted by INKY.

The event invitation included a link called Preview Document. And that’s where the scam became dangerous. Clicking on that link would have brought the user to a webpage that looked like a Microsoft site but actually was set up to steal Microsoft account credentials.

credential harvesting campaign Preview Documents link.

Taking the bait, researchers at INKY clicked on the link and entered a phony username and password at the phishing site. The first attempt triggered an invalid password error, a known tactic in which the user is told that their credentials aren’t valid but those credentials are actually harvested behind the scenes. A second attempt to enter credentials didn’t trigger the same error but simply directed the user back to their own company’s website as indicated in their email address.

Credential harvesting message.

In response to INKY’s findings, Calendly sent a statement to TechRepublic explaining how its app was targeted and what security methods it uses to thwart certain types of attacks.

“Security is a top priority at Calendly,” a Calendly spokesperson said. “Similar to other major technology providers, we have an extensive network of tools and systems in place, such as a next-generation web application firewall, fraudulent IP tracking, and anomalous traffic pattern alerts. We also recommend customers add an additional layer of protection with a password manager and two-factor authentication. In this instance, a malicious link was inserted into a customized booking page. Phishing attacks violate our Terms of Service, and accounts are immediately terminated when found or reported. We have a dedicated team that constantly enhances our security techniques, and we will continue to refine and stay vigilant to protect our users and combat such attacks.”

For this campaign, the attackers employed a variety of devious tactics:

  • Brand impersonation. Impersonating a brand like Microsoft adds familiarity.
  • Credential harvesting. The victims think they’re logging into a legitimate site but are actually exposing their credentials to the attackers.
  • Compromised email accounts. The attackers use and abuse legitimate email accounts as a way to sneak past security gateways.
  • Dynamic redirection. The scammers use the victim’s own email address to redirect them back to their own company website.

Recommendations to thwart an attack

To help you protect yourself and your organization from this type of phishing attack, INKY offers the following tips:

  • Always scrutinize the sender’s email address and display name. In the attack described by INKY, the email claimed to be sent from Microsoft but came from a non-Microsoft domain.
  • Always hover over a link to see its actual destination. Though calendly.com is a legitimate and safe site, you wouldn’t normally go there to view a Microsoft notification.
  • To defend yourself against credential harvesting, one option is to use a password manager. Such tools automatically compare a website’s URL with the URL stored in their database. If the two don’t match, the password manager won’t enter the credentials. In this case, the URL phishing site impersonating Microsoft would not have jibed with the URL stored in the password manager for Microsoft.



Source link

Related articles

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Tags: accountappAttackscalendarCredentialsExploitfreephishingSteal
Share76Tweet47

Related Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
0

“This is something we’re seeing affecting more and more organizations, and it’s likely due to an increasingly crowded market for...

High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
0

Flashpoint is warning organizations of two newly identified critical vulnerabilities in NetModule Router Software (NRSW) that could be exploited in...

Top 5 best backup practices

Top 5 best backup practices

August 10, 2022
0

Give yourself peace of mind by implementing a new backup strategy with our tips. Image: apinan/Adobe Stock You know that...

NVIDIA Fixes High-Severity Flaws in Graphics Drivers For Windows, Linux

Microsoft Fixes Known, Exploited Flaw in Windows Diagnostic Tool

August 10, 2022
0

Microsoft said it fixed a variant of a publicly known vulnerability that was first reported to the company in 2019....

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
0

A former Twitter worker was found guilty on Tuesday of spying for Saudi officials keen to unmask critics on the...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
Makulu Linux Shift makes shifting between desktop layouts easy

Makulu Linux Shift makes shifting between desktop layouts easy

August 10, 2022

Recent Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp security Software TFT Threat Top vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved