Promptware Leveraged Google Calendar Invites in Credential Harvesting Campaign

Related

ApolloMD Data Breach Impacts More Than 620,000

What happened A cyberattack on the Georgia-based healthcare provider ApolloMD...

Atlas Air Ransomware Breach Allegedly Exposes Boeing Technical Data

What happened Attackers claiming affiliation with the Everest ransomware gang...

Threat Actors Leveraging Employee Monitoring and SimpleHelp Tools in Attacks

What happened Security researchers have documented threat actors abusing legitimate...

Palo Alto Networks Firewall Reboot Loop Flaw Affects Next-Generation Devices

What happened A software flaw in Palo Alto Networks next-generation...

Promptware Leveraged Google Calendar Invites in Credential Harvesting Campaign

What happened Security researchers from ReversingLabs have uncovered a malicious...

Share

What happened

Security researchers from ReversingLabs have uncovered a malicious campaign in which threat actors used Google Calendar invites created by a service called Promptware to distribute credential harvesting links. According to the report, the campaign involved automated creation of calendar events that included URLs pointing to phishing pages designed to collect login credentials from unsuspecting recipients. These invites were sent to large numbers of users, and because they originated from legitimate calendar infrastructure, recipients often saw them in their Google Calendar interfaces without triggering typical email-based phishing filters. Users who clicked the links in the event details were directed to fake login portals where credentials could be captured by the attackers. Researchers noted that the use of authentic Google Calendar invites enabled the distributors to evade some traditional security controls and improved the likelihood of users interacting with the malicious content.

Who is affected

Users who received and interacted with the malicious Google Calendar invites are affected, as clicking the embedded links and entering credentials on the phishing pages can result in unauthorized account access.

Why CISOs should care

The abuse of trusted collaboration and scheduling platforms like Google Calendar to deliver credential harvesting lures shows how threat actors are exploiting diverse communication channels to bypass traditional email-centric defenses and reach users through other trusted workflows.

3 practical actions

  • Audit calendar integrations. Review third-party services that can create events on behalf of users to detect unauthorized invite generation.
  • Monitor for unsolicited invites. Detect spikes in calendar events with links that originate from outside known internal sources.
  • Educate users on invite safety. Inform stakeholders about the risks of clicking links embedded in unsolicited meeting invitations.