Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Hackers use Apple Calendar invitations to deliver phishing scams through notes field

Scammers exploit routine calendar notifications to trick victims into installing malicious software and exposing financial data.

byKerem Gülen
September 11, 2025
in Cybersecurity
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Cybercriminals have discovered a method to embed phishing scams directly into the notes section of legitimate Apple Calendar invitations.

This exploit transforms a trusted application into a vehicle for digital fraud by leveraging users’ inherent confidence in calendar invites.

Apple Calendar phishing attacks exploit user trust in legitimate invitations

The attack strategy capitalizes on heightened user awareness of traditional scam channels like text messages and emails. While users remain cautious of unsolicited communications, they often lower their guard when dealing with routine automated actions such as accepting calendar invitations.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Apple Calendar invites appear official and follow standardized templates, creating a false sense of security that scammers easily exploit.

How the calendar invitation scam works

The deceptive process follows these steps:

  • Scammer creates a genuine Apple Calendar invitation through Apple’s official service,
  • Fraudulent message inserted in the “notes” field falsely thanks recipient for a significant purchase,
  • Victim, who made no such purchase, believes their credit card has been compromised,
  • Notes field includes a phone number for “dispute resolution”,
  • Victim calls the number expecting customer service assistance.

Fake customer service leads to malware installation

When victims call the provided number, they connect with someone posing as a customer service representative. This person offers to reverse the charge and process a refund, then instructs the victim to download software supposedly needed for dispute resolution.

The downloaded software serves as the primary attack vector, capable of stealing funds directly from accounts, installing additional malware, and extracting sensitive personal data.

Protection requires independent verification

Users can prevent falling victim to calendar invitation scams by independently verifying all contact information. Anyone suspecting fraudulent charges should visit their card issuer’s or PayPal’s official website to find legitimate dispute phone numbers.

Never use phone numbers provided in suspicious calendar invites, and always verify purchase claims through official banking or payment platform channels before taking any action.


Featured image credit

Tags: Apple CalendarCybersecurityFeatured

Related Posts

A critical flaw in Apple Podcasts allows automatic app launches

A critical flaw in Apple Podcasts allows automatic app launches

December 2, 2025
Android December 2025 patch fixes critical DoS flaw

Android December 2025 patch fixes critical DoS flaw

December 2, 2025
How to secure AI work on public Wi-Fi

How to secure AI work on public Wi-Fi

December 2, 2025
Tor replaces legacy encryption to block traffic tagging attacks

Tor replaces legacy encryption to block traffic tagging attacks

December 1, 2025
Why this country bans Android for senior officers over malware fears

Why this country bans Android for senior officers over malware fears

December 1, 2025
AWS introduces DNS failover feature to prevent future outages

AWS introduces DNS failover feature to prevent future outages

November 28, 2025

LATEST NEWS

Apple’s App Store winners show AI is now just a hidden feature

Uber launches robotaxi service in Dallas with Avride fleet

These are Google’s favorite Chrome extensions in 2025

Superhuman’s AI email tools are now everywhere in your inbox

Get Amazon Music Unlimited for free for three months

WordPress launches Telex AI to vibe code custom blocks

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.