Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Hackers use Apple Calendar invitations to deliver phishing scams through notes field

Scammers exploit routine calendar notifications to trick victims into installing malicious software and exposing financial data.

byKerem Gülen
September 11, 2025
in Cybersecurity

Cybercriminals have discovered a method to embed phishing scams directly into the notes section of legitimate Apple Calendar invitations.

This exploit transforms a trusted application into a vehicle for digital fraud by leveraging users’ inherent confidence in calendar invites.

Apple Calendar phishing attacks exploit user trust in legitimate invitations

The attack strategy capitalizes on heightened user awareness of traditional scam channels like text messages and emails. While users remain cautious of unsolicited communications, they often lower their guard when dealing with routine automated actions such as accepting calendar invitations.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Apple Calendar invites appear official and follow standardized templates, creating a false sense of security that scammers easily exploit.

How the calendar invitation scam works

The deceptive process follows these steps:

  • Scammer creates a genuine Apple Calendar invitation through Apple’s official service,
  • Fraudulent message inserted in the “notes” field falsely thanks recipient for a significant purchase,
  • Victim, who made no such purchase, believes their credit card has been compromised,
  • Notes field includes a phone number for “dispute resolution”,
  • Victim calls the number expecting customer service assistance.

Fake customer service leads to malware installation

When victims call the provided number, they connect with someone posing as a customer service representative. This person offers to reverse the charge and process a refund, then instructs the victim to download software supposedly needed for dispute resolution.

The downloaded software serves as the primary attack vector, capable of stealing funds directly from accounts, installing additional malware, and extracting sensitive personal data.

Protection requires independent verification

Users can prevent falling victim to calendar invitation scams by independently verifying all contact information. Anyone suspecting fraudulent charges should visit their card issuer’s or PayPal’s official website to find legitimate dispute phone numbers.

Never use phone numbers provided in suspicious calendar invites, and always verify purchase claims through official banking or payment platform channels before taking any action.


Featured image credit

Tags: Apple CalendarCybersecurityFeatured

Related Posts

WestJet cyberattack: 1.2m passengers’ data stolen

WestJet cyberattack: 1.2m passengers’ data stolen

October 2, 2025
Wiz: AI vibe coding leads to insecure authentication

Wiz: AI vibe coding leads to insecure authentication

September 29, 2025
DHS uses AI to detect AI-generated child abuse material

DHS uses AI to detect AI-generated child abuse material

September 29, 2025
Salesforce Agentforce hit by Noma “ForcedLeak” exploit

Salesforce Agentforce hit by Noma “ForcedLeak” exploit

September 26, 2025
Co-op Group reports £75m loss after April cyber-attack

Co-op Group reports £75m loss after April cyber-attack

September 25, 2025
Taiwan industrial production up 14.4% in August thanks to AI chips

Taiwan industrial production up 14.4% in August thanks to AI chips

September 25, 2025

LATEST NEWS

Z.AI GLM-4.6 boosts context window to 200K tokens

OpenAI releases Sora 2, iOS app with real-world inserts

Bitrig: SwiftUI apps from voice using Apple Intelligence

Bengio warns hyper-AI preservation goals threaten humanity

Apple TV 4K to feature A17 Pro chip and Apple Intelligence

Instagram tests Reels-first home tab in India

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.