Phishing assaults exploit free calendar app to steal account credentials

0
118
Phishing assaults exploit free calendar app to steal account credentials

[ad_1]

A credential harvesting marketing campaign noticed by INKY on the finish of February tried to lure its victims to Calendly, a official and free on-line calendar app.

Picture: weerapatkiatdumrong, Getty Photos/iStockphoto
Cybercriminals who specialise in phishing assaults prefer to level individuals to precise web sites as a lot as doable. Utilizing such websites lends an air of legitimacy to the rip-off, rising the chances of tricking the recipients. In a report launched Thursday, electronic mail safety supplier INKY describes a latest phishing marketing campaign that took benefit of the Calendly calendar app to reap delicate account credentials from unsuspecting victims.
Found by INKY towards the top of February, the individuals behind this specific phishing assault inserted malicious hyperlinks in occasion invites despatched by Calendly. One motive the criminals selected Calendly could also be as a result of the positioning permits customers to arrange free accounts with out coming into any bank card or cost data. One other doable motive is that customers can customise Calendly’s invitation pages, permitting scammers to insert malicious hyperlinks in them.
SEE: “Browser within the Browser” assaults: A devastating new phishing method arises (TechRepublic)
To kick off the marketing campaign, the attackers despatched out phishing emails from numerous hijacked accounts. Some 64 INKY prospects checked their inboxes solely to search out these emails with a message of “new paperwork acquired” and a hyperlink to allegedly view these paperwork. Clicking on the hyperlink would then take the recipient to an occasion invitation on Calendly.

The occasion invitation included a hyperlink referred to as Preview Doc. And that’s the place the rip-off grew to become harmful. Clicking on that hyperlink would have introduced the consumer to a webpage that regarded like a Microsoft website however truly was set as much as steal Microsoft account credentials.

Taking the bait, researchers at INKY clicked on the hyperlink and entered a phony username and password on the phishing website. The primary try triggered an invalid password error, a recognized tactic during which the consumer is advised that their credentials aren’t legitimate however these credentials are literally harvested behind the scenes. A second try and enter credentials didn’t set off the identical error however merely directed the consumer again to their very own firm’s web site as indicated of their electronic mail handle.

In response to INKY’s findings, Calendly despatched an announcement to TechRepublic explaining how its app was focused and what safety strategies it makes use of to thwart sure sorts of assaults.
“Safety is a high precedence at Calendly,” a Calendly spokesperson stated. “Much like different main expertise suppliers, we’ve an in depth community of instruments and techniques in place, reminiscent of a next-generation net software firewall, fraudulent IP monitoring, and anomalous visitors sample alerts. We additionally suggest prospects add a further layer of safety with a password supervisor and two-factor authentication. On this occasion, a malicious hyperlink was inserted right into a custom-made reserving web page. Phishing assaults violate our Phrases of Service, and accounts are instantly terminated when discovered or reported. We have now a devoted group that always enhances our safety strategies, and we’ll proceed to refine and keep vigilant to guard our customers and fight such assaults.”
For this marketing campaign, the attackers employed a wide range of devious ways:

Model impersonation. Impersonating a model like Microsoft provides familiarity.
Credential harvesting. The victims suppose they’re logging right into a official website however are literally exposing their credentials to the attackers.
Compromised electronic mail accounts. The attackers use and abuse official electronic mail accounts as a solution to sneak previous safety gateways.
Dynamic redirection. The scammers use the sufferer’s personal electronic mail handle to redirect them again to their very own firm web site.

Suggestions to thwart an assault
That can assist you defend your self and your group from this sort of phishing assault, INKY presents the next ideas:

All the time scrutinize the sender’s electronic mail handle and show title. Within the assault described by INKY, the e-mail claimed to be despatched from Microsoft however got here from a non-Microsoft area.
All the time hover over a hyperlink to see its precise vacation spot. Although calendly.com is a official and secure website, you wouldn’t usually go there to view a Microsoft notification.
To defend your self towards credential harvesting, one choice is to make use of a password supervisor. Such instruments routinely examine an internet site’s URL with the URL saved of their database. If the 2 don’t match, the password supervisor received’t enter the credentials. On this case, the URL phishing website impersonating Microsoft wouldn’t have jibed with the URL saved within the password supervisor for Microsoft.

[ad_2]