Site icon Check Point Blog

Google Calendar Notifications Bypassing Email Security Policies

Google Calendar is a tool for organizing schedules and managing time, designed to assist individuals and businesses in planning their days efficiently. According to Calendly.com, Google Calendar is used by more than 500 million people and is available in 41 different languages.

Due to Google Calendar’s popularity and efficiency in everyday tasks, it is no wonder it has become a target for cyber criminals. Recently, cyber security researchers at Check Point, have observed cyber criminal manipulation of dedicated Google tools – namely Google Calendar and Google Drawings. Many of the emails appear legitimate because they appear to directly originate from Google Calendar.

Cyber criminals are modifying “sender” headers, making emails look as though they were sent via Google Calendar on behalf of a known and legitimate individual. Roughly 300 brands have been affected by this campaign thus far, with cyber researchers observing over 4,000 of these phishing emails in a four week period.

Threat Overview

As noted previously, these phishing attacks initially exploited the user-friendly features inherent in Google Calendar, with links connecting to Google Forms.

However, after observing that security products could flag malicious Calendar invites, cyber criminals evolved the attack to align with the capabilities of Google Drawings.

Cyber Criminal Motives

At the heart of this campaign, cyber criminals aim to fool users into clicking on malicious links or attachments that allow for the theft of either corporate or personal information.

After an individual unwittingly discloses sensitive data, the details are then applied to financial scams, where cyber criminals may engage in credit card fraud, unauthorized transactions or similar, illicit activities. The stolen information may also be used to bypass security measures on other accounts, leading to further compromise.

For both organizations and individuals, these types of scams can prove extremely stressful, with long-term, deleterious effects.

Attack Execution Techniques

As noted previously, the initial emails include a link or the calendar file (.ics) with a link to Google Forms or Google Drawings.

Users are then asked to click on another link, which is often disguised as a fake reCAPTCHA or support button.

After clicking on the link, the user is forwarded to a page that looks like a cryptocurrency mining landing page or bitcoin support page.

These pages are actually intended to perpetrate financial scams. Once users reach said page, they are asked to complete a fake authentication process, enter personal information, and eventually provide payment details.

The phishing attack shown below initially began with a Google Calendar invite. Some of the emails do really look like calendar notifications, while others use a custom format:

Initial phishing attack email example

If the guests were known contacts, a user might believe the ruse, as the rest of the screen looks relatively ordinary:

Google Calendar set-up

Blocking This Attack

For organizations that want to safeguard users from these types of phishing threats and others, consider the following practical recommendations:

For individuals who are concerned about these scams reaching their personal inboxes, consider the following practical recommendations.

When asked for comment, Google stated, “We recommend users enable the “known senders” setting in Google Calendar. This setting helps defend against this type of phishing by alerting the user when they receive an invitation from someone not in their contact list and/or they have not interacted with from their email address in the past.”

In 2025, upgrade your email security solution. Speak with an expert today and get a Harmony Email & Collaboration demo.

Exit mobile version