INKY has published research that analyzes a novel email phishing attack delivered via hijacked accounts luring victims to the modern scheduling platform Calendly where the threat actors crafted a clever sequence leading to a credential-harvesting payload that impersonates Microsoft 365. INKY’s cybersecurity researchers detected this credential harvesting operation exploiting the free online appointment scheduling software by hackers inserting malicious links on Calendly’s event invitations.
Calendly displays confirmation pages for invitees after scheduling, which are customizable. In this attack, phishers uncovered this and created a fraudulent SharePoint notification with fax attributes including several pages/file sizes using the “Add Custom Link” feature to insert a malicious link on the event confirmation page.
As part of the company’s investigation, an INKY engineer entered a fake username and password to test the phishing site and got a fake invalid-password error. Behind the scenes, the attackers harvested the fake credentials. Another attempt to log in led to a second harvesting event, whereupon the victim was redirected to their own (supposed) domain.
I had a look at this report yesterday ahead of its publication and I have to admit that this is crafty. Many people are so used to doing whatever a site telling them to do that I can see how this would be effective. It underlines that everyone needs to be vigilant 100% of the time.
You can read the full report here.
UPDATE: A Calendly spokesperson reached out to me with this statement:
“Security is a top priority at Calendly. Similar to other major technology providers, we have an extensive network of tools and systems in place, such as a next-generation web application firewall, fraudulent IP tracking, and anomalous traffic pattern alerts. We also recommend customers add an additional layer of protection with a password manager and two-factor authentication.
In this instance, a malicious link was inserted into a customized booking page. Phishing attacks violate our Terms of Service and accounts are immediately terminated when found or reported. We have a dedicated team that constantly enhances our security techniques, and we will continue to refine and stay vigilant to protect our users and combat such attacks.”
There’s A Dangerous Microsoft Phishing Email Making The Rounds
Posted in Commentary with tags Microsoft, Phishing on October 8, 2023 by itnerdA reader sent me this email that when I examined it, illustrates how a well done phishing email can be extremely dangerous.
Let’s start with the email:
The look of this email is very well done. It will fool a lot of people. If click on the “Verify Now” link which for the record you should not do, you get this:
To add to the legitimacy of the scam, you have to pass through this fake Cloudflare page. Fun fact. Microsoft doesn’t use Cloudflare to verify connections and protect against denial of service attacks. You next go here:
This is a perfect replication of a Microsoft login screen. Again, this is going to fool a lot of people. And it does some checking to see if an account is likely to be valid. I say that because I originally typed in “fuckyouscammer@hotmail.com” and had that rejected. So I had to go with “screwyouscammer@hotmail.com” to get this password screen:
Again, a very well done replication of a real password screen from Microsoft. And what’s interesting is that it actually checks to see if the password is valid. So that implies that whomever is behind this is really sophisticated and trying to harvest credentials to use for whatever evil purposes that they have in mind.
Now how did I figure out that this email was not from Microsoft, there were a couple of things that caught my eye:
Seeing as Microsoft uses Microsoft.com for all its communications, this email makes it clear that this email is from someone other than Microsoft.
The URL in the fake login page isn’t one that uses Microsoft.com. That’s another sign that this is something that you should be avoiding.
This phishing campaign is clearly aimed at Outlook.com as well as Microsoft 365 users. Thus if you’re in one camp or the other, you need to watch out for this email hitting your inbox as you’re clearly a target. And if you do get this email, delete it and move on with your day.
Leave a comment »