Apple iCloud Calendar phishing scam bypasses spam filters to steal data

NEWNow you can listen to FOX News articles!
Identity hunting attacks are becoming more and more sophisticated and the last deception is exploiting a reliable platform to a new level. Instead of sending generic or suspicious-looking emails, the attackers abuse Apple’s Icloud calendar invitation system directly from Apple’s e-mail servers directly from Apple’s e-mail servers.
This smart tactic allows fraudulent messages to skip spam filters and undoubtedly look more legitimate for users. The aim is to cause you to call the fake support number of a scammer under the claim to object to a fraudulent Paypal process. Once the communication has been established, you will be manipulated to remotely access your devices or to share sensitive data.
Sign up for my free Cyberguy report
Get my best technology tips, emergency security warnings and special opportunities delivered directly to your incoming box. Also, you will instantly access my final fraud survival guide – Cyberguy.com bulletin.
The new evite identity assistant fraud is using emotional activity invitations to target victims
Frauds are using Apple’s iCloud calendar to offer identity hunt. (Photographer: Brent Lewin/Bloomberg through Getty Images)
How does it use the scam invites the iCloud calendar to skip security
The heart of this deception is to abuse Apple’s official infrastructure to provide reliability to an identity hunting initiative. Instead of using a suspicious or easily marked E -Post address, attackers send calendar invitations from Noreply@email.apple.com from Apple’s original domain, as reported by Blewing Computer.
The attacker makes the identity hunt message in the “Notes” section of the calendar activity to appear as a legitimate notification. They send the calendar invitation to a Microsoft 365 E -Posta address, which is part of a mail list. As a result, the invitation is automatically transmitted to multiple real targets and expands its access to scam.
Typically, when E -mails are transmitted, checks fail, as the SPF (sender principle) is not listed as a routine or authorized sender. However, Microsoft 365 uses a technique called the rewriting scheme (SRS), which rewrite the way to return the message to pass the SPF controls.
This makes E -mail look completely legitimate for both the receiver’s incoming box and automatic spam filters. As a result, it is much more likely that the message will reach a user’s incoming box without being marked, which increases the chance of the victim’s feeding.
Frauds are using Docusign e -mails to force Apple Pay Fraud.

Cyber criminals use Microsoft 365 routing and Apple’s E -Posta field more than filters. (Lindsey Nicholson/UCG/Universal Images Group) through Getty Images)
This identity hunting fraud is particularly dangerous
What makes this campaign particularly dangerous is the sense of legitimacy. Since Apple’s official servers send E -mail directly, users are more likely to suspect the foul game. The message itself aims to panic the recipient by claiming that it has occurred without the consent of a large Paypal process. The message contains “communication support” and a phone number to object to the accusation, but in fact the victim connects the victim to a scammer.
After calling the victim number, the scammer poses as a technical support agent and tries to convince his computers that their computers are in danger. The next step is to ask you to download remote access software under the guise of making repayment from the victim or guarantee the account.
In fact, this access is used to steal banking information, install malware or provide personal data. Since the original message has a safety checks and looks reliable, victims usually do not think twice before acting.
Falling identity hunt for this bank cheat cheat

Frauds are missing the Icloud calendar to deceive users to call fake support lines. (Through Getty Images, Jonathan Raa/Nurphoto)
6 ways to stay safe from Icloud calendar scammers
I have listed some of the useful steps that you can take to protect yourself against this more sophisticated identity hunting from the victim of falling:
1) Carefully treat unexpected calendar invitations
If you receive an unexpected calendar invitation, especially if you receive an invitation with a strange message or worrying claims, do not open or do not respond. Legitimate companies rarely send payment disputes or security warnings through calendar invitations. Always confirm the suspicious allegations by logging in to your official account.
2) Avoid calling the numbers listed in e -mails or calendar invitations
Identity Hunt fraud usually includes phone numbers that connect you to fraudsters posing as support agents. Instead of calling the number in the message, use the official contact information on the company’s official website.
3) Upload reliable antivirus software
Antivirus programs protect your computer from malicious software and identity hunting sites by preventing suspicious downloads and warning you about insecure websites.
The best way to protect yourself from malicious connections that uploaded malware that accesses your private information is to have a strong antivirus software on all your devices. This protection can warn you about identity hunting and ransom software fraud by keeping your personal information and digital assets safe. In addition, keeping your antivirus up -to -date allows him to defend against the latest threats.
Get my choices for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices Cyberguy.com.
4) Remove your personal data from general lists
Computer pirates can send you this identity hunt E -mail because they have your data. Using personal data removal service helps to clean your personal information from data broker websites. This makes it difficult for the attackers to collect details about you and to craft convincing, targeted identity hunting attacks.
Although no service can ensure that your data can be completely removed from the Internet, a data removal service is a really smart choice. They are not cheap and not your privacy. These services do the whole job for you by actively monitoring your personal information from hundreds of websites and systematically deleting it. This is what gives me peace and proves that your personal data is the most effective way to delete it from the internet. By limiting the existing information, you will make it difficult for scammers to target you by reducing the risk of crossing the cross -reference, the risk of obtaining from violations with the information they can find in dark network.
Take a look at my best choices for data removal services and visit a free scan to find out if your personal information is already on the web Cyberguy.com.
Get a free screening to find out if your personal information is already on the web: Cyberguy.com.
5) Use a password manager
A password manager helps you create strong, unique passwords for each account and keep it safely. This reduces the risk of reusing weak passwords that scammers can easily benefit from unauthorized access to your accounts.
Then see if your E -mail has appeared in past violations. Our selection of password administrator number 1 includes an established infringer browser that checks whether your e-mail address or passwords appear in known leaks. If you discover a match, replace the redeveloped passwords immediately and secure these accounts with new, unique identity information.
Check out the password managers for the best expert in 2025. Cyberguy.com.
6) Keep software and systems up to date
Regularly update your operating system, browser,
And applications help with security vulnerabilities in which attackers often exploit identity hunting in their fraud. Staying up to date with updates minimizes your exposure to known threats.
Click here to get the Fox News app
Wolf’s key takeaway
Frauds, reliable platforms to offer malicious content by manipulating the uncomfortable new direction of identity hunting attacks. The safest approach is to treat any unexpected calendar invitation, especially those with worrying messages or strange contact numbers. Never call the number given in the message or click any link. Instead, go directly to the official websites or the official control panel of your account to confirm the suspicious activity.
Have you been targeted by a hunting hunting hunt as a hidden as an official message? Type us by writing to us Cyberguy.com.
Sign up for my free Cyberguy report
Get my best technology tips, emergency security warnings and special opportunities delivered directly to your incoming box. Also, you will instantly access my final fraud survival guide – Cyberguy.com bulletin.
Copyright 2025 Cyberguy.com. All rights reserved.



