Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Hackers use Apple Calendar invitations to deliver phishing scams through notes field

Scammers exploit routine calendar notifications to trick victims into installing malicious software and exposing financial data.

byKerem Gülen
September 11, 2025
in Cybersecurity
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Cybercriminals have discovered a method to embed phishing scams directly into the notes section of legitimate Apple Calendar invitations.

This exploit transforms a trusted application into a vehicle for digital fraud by leveraging users’ inherent confidence in calendar invites.

Apple Calendar phishing attacks exploit user trust in legitimate invitations

The attack strategy capitalizes on heightened user awareness of traditional scam channels like text messages and emails. While users remain cautious of unsolicited communications, they often lower their guard when dealing with routine automated actions such as accepting calendar invitations.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Apple Calendar invites appear official and follow standardized templates, creating a false sense of security that scammers easily exploit.

How the calendar invitation scam works

The deceptive process follows these steps:

  • Scammer creates a genuine Apple Calendar invitation through Apple’s official service,
  • Fraudulent message inserted in the “notes” field falsely thanks recipient for a significant purchase,
  • Victim, who made no such purchase, believes their credit card has been compromised,
  • Notes field includes a phone number for “dispute resolution”,
  • Victim calls the number expecting customer service assistance.

Fake customer service leads to malware installation

When victims call the provided number, they connect with someone posing as a customer service representative. This person offers to reverse the charge and process a refund, then instructs the victim to download software supposedly needed for dispute resolution.

The downloaded software serves as the primary attack vector, capable of stealing funds directly from accounts, installing additional malware, and extracting sensitive personal data.

Protection requires independent verification

Users can prevent falling victim to calendar invitation scams by independently verifying all contact information. Anyone suspecting fraudulent charges should visit their card issuer’s or PayPal’s official website to find legitimate dispute phone numbers.

Never use phone numbers provided in suspicious calendar invites, and always verify purchase claims through official banking or payment platform channels before taking any action.


Featured image credit

Tags: Apple CalendarCybersecurityFeatured

Related Posts

FTC bans GM from selling driver data without explicit consent

FTC bans GM from selling driver data without explicit consent

January 15, 2026
10-hour long Verizon outage is finally resolved

10-hour long Verizon outage is finally resolved

January 15, 2026
85% of security leaders are flying blind on supply chain threats, Panorays study says

85% of security leaders are flying blind on supply chain threats, Panorays study says

January 14, 2026
Instagram denies data breach, blames reset glitch

Instagram denies data breach, blames reset glitch

January 12, 2026
AWS outage disrupts Fortnite and Steam

AWS outage disrupts Fortnite and Steam

December 25, 2025
Aflac data breach affected 22.65M customers

Aflac data breach affected 22.65M customers

December 24, 2025

LATEST NEWS

Substack goes for the living room with beta TV app launch

Google rolls out opt-in “Personal Intelligence” for AI Pro and Ultra users

JBL launches AI-powered BandBox amps

The billion-event problem: How data engineering powers 8-hour battery life in AR glasses

Influencer collaboration with brands: 15 real formats beyond the sponsored post

From fragmented systems to intelligent workflows: How CRM platforms like Salesforce power data-driven enterprise operations

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.