Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

iCloud Calendar Used For Phishing Emails

iCloud Calendar Used For Phishing Emails

September 9, 2025
Reading Time: 3 mins read
in Alerts
Atomic Stealer Masquerades As Cracked App

Abusing iCloud Calendar invites to send emails is a new method for attackers to bypass email spam filters and deliver callback phishing scams directly to inboxes. This technique leverages legitimate features of Apple’s iCloud service. The phishing emails, which appear to be payment receipts for a large sum, are sent from “noreply@email.apple.com” and successfully pass standard email security checks like SPF, DMARC, and DKIM. The scam works by creating an iCloud Calendar invite with the phishing message placed in the notes section, and then sending the invitation to a mailing list controlled by the scammer. This mailing list then forwards the invite to the actual targets, with the email appearing to come from Apple’s trusted servers.

The core of the scam is a classic callback phishing scheme, where the goal is to scare the recipient into calling a provided phone number. The email claims a significant amount has been charged to their PayPal account, and it offers a “support” number to “discuss” or “cancel” the payment. The sense of urgency and fear of a fraudulent charge is designed to make the target act without thinking. The phone number, however, connects the user directly to a scammer.

When a target calls the provided number, a scammer on the other end will attempt to further manipulate them. They often try to convince the victim that their account has been compromised and that they need to take immediate action to secure it. This action often involves the scammer asking the victim to download and run remote access software. By doing so, the victim unknowingly grants the scammer control over their computer.

Once the scammer has remote access, the consequences can be severe. In past similar scams, this access has been used for various malicious purposes, including stealing money directly from bank accounts, deploying malware to compromise the computer further, or exfiltrating sensitive personal data. The seemingly harmless act of calling a “support” number can escalate into a full-blown security and financial nightmare.

The effectiveness of this particular phishing campaign lies not in a new type of lure, but in the sophisticated delivery method. By abusing a legitimate feature and a trusted sender (Apple), the scammers add a layer of credibility to their emails, making it more likely for the messages to bypass spam filters and be opened by the recipient. This method highlights the need for users to be vigilant and cautious, even when an email appears to be from a well-known and reputable company. If an unexpected calendar invite or a strange message appears, it is always safer to treat it with extreme caution and verify the information through official channels rather than calling a number provided in the email.

Reference:

  • Phishing Emails Sent Via ICloud Calendar Using Apples Own Servers
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

Gift Card Heist Via Cloud Hackers

Gift Card Heist Via Cloud Hackers

October 23, 2025
Gift Card Heist Via Cloud Hackers

Fake Zoom Calls Target Ukraine Aid

October 23, 2025
Gift Card Heist Via Cloud Hackers

MuddyWater Launches Global Spying

October 23, 2025
PolarEdge Expands Router Botnet

PolarEdge Expands Router Botnet

October 22, 2025
PolarEdge Expands Router Botnet

Google Finds New Russian Malware

October 22, 2025
PolarEdge Expands Router Botnet

Copilot Flaw Exposes Sensitive Data

October 22, 2025

Latest Alerts

Gift Card Heist Via Cloud Hackers

MuddyWater Launches Global Spying

Fake Zoom Calls Target Ukraine Aid

Copilot Flaw Exposes Sensitive Data

PolarEdge Expands Router Botnet

Google Finds New Russian Malware

Subscribe to our newsletter

    Latest Incidents

    Ransomware Hits Jewett Cameron

    Salt Typhoon Hacks European Telecom

    JFL Loses 800K Weekly After Hack

    Union Cyberattack Raises Concerns

    Romanian Prisoner Hacks Prison IT

    Hackers Claim Data On NSA Officials

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial