Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Using Calendly-Themed Phishing Attack to Steal Google Workspace Account

Hackers Using Calendly-Themed Phishing Attack to Steal Google Workspace Account

Posted on December 3, 2025December 3, 2025 By CWS

A classy phishing marketing campaign has emerged focusing on enterprise professionals with Calendly-themed emails, combining social engineering with superior credential theft methods.

The assault particularly focuses on Google Workspace and Fb Enterprise accounts, utilizing rigorously crafted job alternative lures to trick customers into sharing their login info.

The marketing campaign started when a buyer acquired a extremely convincing electronic mail impersonating a recruiter from LVMH, the luxurious items conglomerate.

Nicely-crafted, multi-stage, extremely focused phishing electronic mail (Supply – Push Safety)

The e-mail praised the recipient’s skilled achievements and supplied a promising job alternative inside LVMH’s digital efficiency workforce.

The message appeared real as a result of it included private particulars in regards to the sufferer’s work expertise and was signed by somebody claiming to be an HR supervisor on the firm.

The attacker doubtless used synthetic intelligence to collect and personalize this info from publicly obtainable sources like LinkedIn.

Push Safety safety analysts recognized the malware after discovering that the assault was a part of a a lot bigger marketing campaign spanning a number of variants and types.

The researchers famous the delicate social engineering ways and detection evasion methods embedded all through the assault infrastructure.

How the Credential Theft Works

The assault makes use of a multi-stage supply technique designed to bypass electronic mail safety filters.

The preliminary electronic mail asks if the recipient is within the alternative, and solely after responding does the attacker ship a follow-up message containing a malicious hyperlink disguised as a Calendly scheduling hyperlink.

This staged strategy helps the phishing electronic mail evade content material scanning instruments that usually flag messages with suspicious hyperlinks.

When victims click on the hyperlink, they land on a convincing pretend Calendly web page that appears practically an identical to the official service.

After finishing a CAPTCHA verification, clicking “Proceed with Google” redirects customers to an Attacker-in-the-Center (AiTM) phishing web page.

Pretend Calendly touchdown web page (Supply – Push Safety)

This web page mimics Google’s login interface however is particularly branded with Calendly parts to seem official.

The phishing infrastructure contains clever validation mechanisms that block unauthorized electronic mail domains from accessing the web page.

Calendly-themed AiTM phishing web page focusing on Google Workspace accounts (Supply – Push Safety)

Solely emails matching the supposed sufferer’s group area can proceed to the password entry area.

Researchers additionally found superior anti-analysis options, together with IP blocking that forestalls investigation from VPN or proxy connections and entry restrictions triggered when developer instruments are opened.

Webpages with related properties to the assault analysed by Push (Supply – Push Safety)

These protections recommend the attackers are actively working to remain forward of safety researchers and automatic evaluation instruments.

The marketing campaign has developed considerably since its inception over two years in the past, with attackers constantly refining their ways and introducing new detection evasion strategies to take care of operational effectiveness.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Account, Attack, CalendlyThemed, Google, Hackers, Phishing, Steal, Workspace

Post navigation

Previous Post: Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud
Next Post: 29.7 Tbps DDoS Attack Via Aisuru botnet Breaks Internet With New World Record

Related Posts

Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol Cyber Security News
Microsoft Azure API Management Flaw Enables Cross-Tenant Account Creation, Bypassing Admin Restrictions Microsoft Azure API Management Flaw Enables Cross-Tenant Account Creation, Bypassing Admin Restrictions Cyber Security News
Lazarus Hackers Exploiting Git Symlink Vulnerability in Sophisticated Phishing Attack Lazarus Hackers Exploiting Git Symlink Vulnerability in Sophisticated Phishing Attack Cyber Security News
X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption Cyber Security News
Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft Cyber Security News
Google Confirms That Claims of Major Gmail Security Warning are False Google Confirms That Claims of Major Gmail Security Warning are False Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News