Cybercriminals abusing popular scheduling tool Calendly to infect Macs with malware — be on your guard for suspicious links and invites
Social engineering can sometimes catch you off-guard
Hackers are using complex social engineering campaigns and calendar invites to distribute Mac malware.
The hackers are abusing calendar scheduling tool Calendly to distribute meeting invites as part of their attempts to fool the best Mac antivirus.
The narrative behind this campaign is far more complex than the usual email spam you might be used to, so here is how they did it, and how to keep yourself safe if you get targeted.
Shady investments
Disclosed by a reader of Krebs On Security, the campaign saw hackers go after cryptocurrency by posing as investors looking for their next startup to provide with funding. In this case, the victim was originally contacted via Telegram looking for an investment opportunity.
The scammer wanted to organize a meeting to discuss the potential investment options, and so the victims sent over their Calendly details in order to organize a video call. The fateful day approached, but nothing happened when the victim attempted to open the meeting link. Low and behold, the scammers’ ‘IT team’ fixed the issue by sending out a new meeting link.
Alas, the second link opened up a technical error message instead of the meeting, with a message displaying that there was an error with the video service. Luckily the message had a handy little script that could fix the issue and allow the victim to finally get some facetime with the potential investors.
Rather than being graced with the face of the generous benefactor, the script installed a trojan with the ability to steal sensitive information from the victims Mac device. The victim, realizing the error of their ways, then changed their passwords and installed a fresh version of macOS.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
While this was a good choice on the victims part, it unfortunately means that there is no evidence to suggest exactly what strain of malware was used.
In order to keep your device safe, always have a healthy amount of suspicion when receiving and clicking on any links sent from a stranger, and be sure to keep your device up to date with the latest updates, or take a look at some of the best firewalls to keep your device secure.
Via TomsGuide
More from TechRadar Pro
- Forget ransomware and phishing attacks — CTOs rate human error as their number one security risk
- Take a look at our guide to the best productivity tools around
- Keep your details safe with the best password manager
Benedict Collins is a Staff Writer at TechRadar Pro covering privacy and security. Benedict is mainly focused on security issues such as phishing, malware, and cyber criminal activity, but also likes to draw on his knowledge of geopolitics and international relations to understand the motivations and consequences of state-sponsored cyber attacks. Benedict has a MA in Security, Intelligence and Diplomacy, alongside a BA in Politics with Journalism, both from the University of Buckingham.
"Doing more with less": NetSuite founder on AI — and why it might actually go a long way to helping boost traditional industries such as accounting
No 'independent chip makers and system makers and storage makers': Industry expert paints bleakest picture of future of IT — insatiable tech appetite of Google, Microsoft and other hyperscalers could kill off competition forever