FraudHIGH

Beware of Fake Malwarebytes Renewal Notices in Your Calendar

MWMalwarebytes Labs
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, scammers are sending fake calendar notices to trick you into calling them about fake charges.

Quick Summary

Scammers are sending fake renewal notices from Malwarebytes in calendar invites. Victims may be tricked into calling fake billing numbers, risking their financial information. Stay alert and verify any suspicious invites.

What Happened

Scammers are launching a new campaign that sends fake calendar invitations impersonating Malwarebytes. These fraudulent notices claim that a renewal charge has been processed, urging recipients to call a fake billing number. The amounts listed in these invitations can be quite high, often reaching hundreds of dollars for services that don’t actually exist. The goal is to create urgency, making you react quickly without thinking critically.

The calendar invitations look convincing, mimicking the format of a professional billing receipt. However, they contain numerous red flags that indicate fraud. For example, the language used is often awkward or incorrect, and the formatting is inconsistent. These details should raise suspicion and prompt caution.

Who's Being Targeted

Anyone who uses calendar applications like Google Calendar or Outlook could fall victim to this scam. The invitations are designed to look like legitimate billing notices, targeting both individuals and businesses. Scammers aim to exploit the trust that users have in these applications, making it crucial for everyone to be vigilant.

Once a victim calls the provided number, they become vulnerable to various tactics aimed at extracting personal and financial information. This could lead to identity theft or unauthorized charges on their accounts. The scammers are skilled at creating a sense of urgency, which can easily lead to panic and poor decision-making.

Signs of Infection

The signs of this scam can be subtle yet alarming. If you receive a calendar invitation that you did not create, especially one that discusses billing or payments, treat it with suspicion. Look for signs such as:

  • Unusual formatting or language errors in the invitation.
  • A title that seems off, such as “Subscription Renewal: [random code].”
  • A lack of a legitimate sender’s email address.

If you notice any of these signs, do not engage with the invitation. Instead, delete it immediately and consider reporting it to your calendar provider. Remember, legitimate companies do not send invoices or billing notices through calendar invites.

How to Protect Yourself

To protect yourself from these scams, follow these steps:

  • Do not call the number listed in the invitation. Instead, contact the company directly using verified contact information.
  • Adjust your calendar settings to prevent automatic additions of events from unknown sources. This will help keep your calendar free from unsolicited invitations.
  • Educate yourself about common phishing tactics. Knowing what to look for can significantly reduce your risk of falling victim.
  • Use security software that includes web protection features. This can help block access to known malicious domains and provide an additional layer of security.

If you’re unsure about a calendar event, consult with a trusted source or use tools like Malwarebytes Guard to assess the situation. Staying informed and cautious is your best defense against these types of scams.

🔒 Pro insight: This tactic mirrors traditional phishing schemes but leverages calendar invites, increasing the likelihood of user interaction and response.

Original article from

MWMalwarebytes Labs
Read Full Article

Related Pings

HIGHFraud

Drift Hack - $285 Million Theft Linked to DPRK Operation

A major hack on Drift resulted in a staggering $285 million theft, linked to a six-month DPRK social engineering operation. This highlights the growing threat of state-sponsored cybercrime in the cryptocurrency sector. Organizations must enhance their security measures to prevent similar attacks.

The Hacker News·
HIGHFraud

Device Code Phishing - Attacks Surge 37 Times in 2026

Device code phishing attacks have skyrocketed this year, with a 37x increase. Users of IoT and streaming devices are particularly at risk. New phishing kits like EvilTokens are making these attacks easier for cybercriminals. Stay alert and protect your accounts.

BleepingComputer·
HIGHFraud

Job Scams - Coca-Cola and Ferrari Offers Are Traps

Scammers are impersonating Coca-Cola and Ferrari with fake job offers to steal your passwords. Job seekers are at high risk as these scams become more sophisticated. Protect your personal information by verifying job offers directly with companies.

Malwarebytes Labs·
HIGHFraud

FCC Proposes $4.5 Million Fine for Voxbeam's Fraudulent Calls

The FCC is proposing a hefty fine against Voxbeam for allowing fraudulent calls to reach American consumers. This could lead to stricter regulations on voice service providers. Stay alert to protect your personal information from scams.

The Record·
HIGHFraud

Windows Extortion Plot - Engineer Pleads Guilty to Charges

A former engineer has pleaded guilty to locking Windows admins out of servers in an extortion scheme. This incident underscores the risks of insider threats. Rhyne's actions could lead to a 15-year prison sentence. Companies must strengthen their cybersecurity measures to prevent similar attacks.

BleepingComputer·
MEDIUMFraud

Business Email Compromise - The New Threat Landscape Explained

A recent fraud attempt shows how business email compromise is evolving. Small organizations are now prime targets for these scams. Awareness is key to staying safe.

Cisco Talos Intelligence·