The post Warning As Google And Microsoft Calendar Hack Surge Confirmed appeared on BitcoinEthereumNews.com. Beware malicious Google and Microsoft calendar invites. SOPA Images/LightRocket via Getty Images Not all cybersecurity attacks involve unsupported operating systems, vulnerabilities without a patch, or password-stealing malware. Many, it has to be said, come under the remit of social engineering, exploiting human weaknesses alongside a little technical threat tomfoolery. The latest such warning has come from Sublime Security after it “observed a significant influx in phishing attacks” against users of Google Workspace and Microsoft 365 calendars. Here’s what you need to know and do. ForbesMicrosoft Sounds Windows 11 And Server Update Failure AlarmBy Davey Winder A Surge Of Malicious Google And Microsoft Calendar Invites It has been almost a year since I last reported about the threat surface that is, erm, your calendar. Yet that threat has not gone away, and Google and Microsoft users are now being warned of a surge in attacks that use calendar invites as a method to evade security solutions and deliver their undoubtedly dangerous payloads. A newly published report by Ahry Jeon, a product manager, and Brandon Murphy, a threat detection engineer, both working at Sublime Security, warns that “depending on the settings of the target’s calendar, even if the email message is automatically quarantined by an email security solution, the calendar entry often remains on the target’s calendar.” An .ics file is a calendar data format used to enable the sharing of events between calendar applications from the likes of Apple, Google, and Microsoft. It is a hugely popular format, not least thanks to the ability to automatically add invites to calendars from Google Workspace and Microsoft 365. In the latter, the security boffins warn, “it will also bring attachments from the email into the invitation.” Obviously, this provides an attacker with a double-whammy threat of the email and the invite to deliver… The post Warning As Google And Microsoft Calendar Hack Surge Confirmed appeared on BitcoinEthereumNews.com. Beware malicious Google and Microsoft calendar invites. SOPA Images/LightRocket via Getty Images Not all cybersecurity attacks involve unsupported operating systems, vulnerabilities without a patch, or password-stealing malware. Many, it has to be said, come under the remit of social engineering, exploiting human weaknesses alongside a little technical threat tomfoolery. The latest such warning has come from Sublime Security after it “observed a significant influx in phishing attacks” against users of Google Workspace and Microsoft 365 calendars. Here’s what you need to know and do. ForbesMicrosoft Sounds Windows 11 And Server Update Failure AlarmBy Davey Winder A Surge Of Malicious Google And Microsoft Calendar Invites It has been almost a year since I last reported about the threat surface that is, erm, your calendar. Yet that threat has not gone away, and Google and Microsoft users are now being warned of a surge in attacks that use calendar invites as a method to evade security solutions and deliver their undoubtedly dangerous payloads. A newly published report by Ahry Jeon, a product manager, and Brandon Murphy, a threat detection engineer, both working at Sublime Security, warns that “depending on the settings of the target’s calendar, even if the email message is automatically quarantined by an email security solution, the calendar entry often remains on the target’s calendar.” An .ics file is a calendar data format used to enable the sharing of events between calendar applications from the likes of Apple, Google, and Microsoft. It is a hugely popular format, not least thanks to the ability to automatically add invites to calendars from Google Workspace and Microsoft 365. In the latter, the security boffins warn, “it will also bring attachments from the email into the invitation.” Obviously, this provides an attacker with a double-whammy threat of the email and the invite to deliver…

Warning As Google And Microsoft Calendar Hack Surge Confirmed

2025/11/04 03:22

Beware malicious Google and Microsoft calendar invites.

SOPA Images/LightRocket via Getty Images

Not all cybersecurity attacks involve unsupported operating systems, vulnerabilities without a patch, or password-stealing malware. Many, it has to be said, come under the remit of social engineering, exploiting human weaknesses alongside a little technical threat tomfoolery. The latest such warning has come from Sublime Security after it “observed a significant influx in phishing attacks” against users of Google Workspace and Microsoft 365 calendars. Here’s what you need to know and do.

ForbesMicrosoft Sounds Windows 11 And Server Update Failure Alarm

A Surge Of Malicious Google And Microsoft Calendar Invites

It has been almost a year since I last reported about the threat surface that is, erm, your calendar. Yet that threat has not gone away, and Google and Microsoft users are now being warned of a surge in attacks that use calendar invites as a method to evade security solutions and deliver their undoubtedly dangerous payloads. A newly published report by Ahry Jeon, a product manager, and Brandon Murphy, a threat detection engineer, both working at Sublime Security, warns that “depending on the settings of the target’s calendar, even if the email message is automatically quarantined by an email security solution, the calendar entry often remains on the target’s calendar.”

An .ics file is a calendar data format used to enable the sharing of events between calendar applications from the likes of Apple, Google, and Microsoft. It is a hugely popular format, not least thanks to the ability to automatically add invites to calendars from Google Workspace and Microsoft 365. In the latter, the security boffins warn, “it will also bring attachments from the email into the invitation.” Obviously, this provides an attacker with a double-whammy threat of the email and the invite to deliver a payload. Double-whammy threat, double the chance of success.

ForbesLinkedIn DM Attack Warning — What Users Need To Know

The Sublime report provides a number of examples of this kind of attack, and I recommend reading it yourself to get up to speed with these. The bullet point summary is:

  • ICS phishing in the body of a calendar entry
  • ICS phishing with a QR code in an attachment
  • ICS phishing with attached HTML

I have reached out to both Google and Microsoft regarding the report and the dangers of .ics phishing attacks for advice to users. In the meantime, Sublime offers the following suggestions for securing your calendars: In the Google Workspace Admin Console, go to Apps|Google Workspace|Calendar|Advanced settings and ensure the ‘Add invitations to my calendar’ option is set to ‘Invitations from known senders’ or ‘Invitations users have responded to via email.’ For Microsoft 365, use PowerShell commands to set AutomateProcessing to None and disable the ‘Calendar Attendant’ from automatically processing invites.

Source: https://www.forbes.com/sites/daveywinder/2025/11/03/warning-as-google-and-microsoft-calendar-hack-surge-confirmed/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

This AI Crypto Token is outperforming PUMP, Bitcoin and Ethereum. And It’s Still in Presale

This AI Crypto Token is outperforming PUMP, Bitcoin and Ethereum. And It’s Still in Presale

The post This AI Crypto Token is outperforming PUMP, Bitcoin and Ethereum. And It’s Still in Presale appeared on BitcoinEthereumNews.com. SPONSORED POST* Most people only hear about the next big crypto opportunity after it has skyrocketed. But occasionally, something new comes along that’s early, accessible, and already showing serious potential. That’s what’s happening with AiAO, the native token of the AlgosOne platform. The token is part of a fully functioning, high-performing trading ecosystem and is still in presale. It’s tied directly to a real AI trading system that outperforms human traders. With guaranteed price increases in every presale round and strong real-world utility, AiAO could be the most brilliant move in crypto this year. A Real AI System That’s Making People Money Most AI crypto projects promise a lot but haven’t launched anything yet. AlgosOne is different. Its AI trading system has been live since 2022, and it’s already delivered consistent results for thousands of users. The algorithm runs without any manual input. There’s no need to write code, no building strategies, and no charts to study. The results speak for themselves. Since launch, AlgosOne’s AI has maintained a verified win rate of over 80%. When the first round of two-year trading contracts matured at the end of 2024, every single one delivered its projected profit range. Some users at higher tiers saw gains as high as 250% in a year. AiAO: The Token That Powers the Whole System AiAO is a utility and governance token that connects users to the AlgosOne ecosystem. Holding the token gives users access to advanced trading tools, better profit tiers, lower commission fees, and even passive income. At the beginning of August, the AIAO presale launched, with stage 1 selling out in just 4 hours, and closing with an 81% price jump. The numbers just got better from there. Stage 2 sold out even quicker, in less than 2 hours, with a staggering 113%…
Share
BitcoinEthereumNews2025/09/21 23:21