By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData Collective
  • Analytics
    AnalyticsShow More
    data science anayst
    Growing Demand for Data Science & Data Analyst Roles
    6 Min Read
    predictive analytics in dropshipping
    Predictive Analytics Helps New Dropshipping Businesses Thrive
    12 Min Read
    data-driven approach in healthcare
    The Importance of Data-Driven Approaches to Improving Healthcare in Rural Areas
    6 Min Read
    analytics for tax compliance
    Analytics Changes the Calculus of Business Tax Compliance
    8 Min Read
    big data analytics in gaming
    The Role of Big Data Analytics in Gaming
    10 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: New Meeting-based Cyberattacks Have Security Specialists on Edge
Share
Notification Show More
Latest News
ai in automotive industry
AI Is Changing the Automotive Industry Forever
Artificial Intelligence
SMEs Use AI-Driven Financial Software for Greater Efficiency
Artificial Intelligence
data security in big data age
6 Reasons to Boost Data Security Plan in the Age of Big Data
Big Data
data science anayst
Growing Demand for Data Science & Data Analyst Roles
Data Science
ai software development
Key Strategies to Develop AI Software Cost-Effectively
Artificial Intelligence
Aa
SmartData Collective
Aa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Privacy > New Meeting-based Cyberattacks Have Security Specialists on Edge
Data Management

New Meeting-based Cyberattacks Have Security Specialists on Edge

Big data is even more important in preventing cybercrime as hackers use calendar events to orchestrate their attacks.

Philip Piletic
Last updated: 2021/09/23 at 8:17 PM
Philip Piletic
6 Min Read
new meeting-based cyberattacks
Shutterstock Licensed Photo - By Menara Grafis | stock vector ID: 1717050355
SHARE

Security specialists and networking engineers are starting to warn users about a dangerous new type of social engineering attack that impacts those who use online meeting applications. Attackers that gain control of a compromised email or messenger account have been able to generate large numbers of forged calendar invites, which they can then send out to a large number of people all at once. As soon as someone who clicks on these invites enters their information, a remote machine makes note of it and sends it back to the bad actors who were behind the attack in the first place.

Contents
Leveraging Calendar Invites as an Attack VectorPatching Calendar Apps Against Social Engineering AttacksConvincing People to Surrender their Details

Arguably, more people use online meeting services now than ever, which makes these sorts of attacks particularly concerning. According to one study, Zoom alone logs over 3.3 trillion minutes of usage every year and that number is likely to grow. Due to the privacy features of some apps like Slack and Discord, it can be difficult to know how many people are on a server unless you’re in it yourself. That means some users may be exposed to these kinds of social engineering attacks without many of their coworkers even being aware of the fact.

It’s this concern in particular that has many people in the cybersecurity industry on the edge of their seats.

Leveraging Calendar Invites as an Attack Vector

Highly skilled website imitators have been able to fashion realistic-looking calendar invite pages that appear like they come from any of the popular services that are being targeted by these attackers. Users of online meeting services generally have full sized contact lists, meaning that someone who gained control of one of these would be free to send out a huge number of invites nearly instantly. These invites would, at least theoretically, look like they came from a legitimate source.

More Read

cybersecurity simulations

Combat AI-Powered Threats with Cybersecurity Simulations & Other Practices

Anti-Spoofing is Crucial for Data-Driven Businesses
How to Plan a Cybersecurity Strategy for Your Small Business
ML is a Vital Defense Against Thwart Digital Attack Surfaces
What Role Does Breach and Attack Simulation Play in Data Protection?

Depending on how realistic they looked, they could encourage outside users to give up their email credentials or surrender contact details related to file sharing services attached to their meeting application. Those who work from home might be sharing information via something like DropBox or OneDrive. If that’s the case, then they may have few qualms about sharing their login information with an otherwise legitimate looking login screen. Once they enter it, however, a bad actor could suddenly start uploading infected material that they could share with other people.

To make matters worse, comparatively little work has been done to secure most digital calendar apps. A great deal of development in the space has been to solve other unrelated issues that had plagued them since they first started to become popular. Developers who’ve already felt beleaguered over these problems are now being asked to address potential security leaks.

Patching Calendar Apps Against Social Engineering Attacks

Engineers are finding it difficult to patch these leaks, due in no small part to the fact that they’re usually based more around a perceived level of trust than actual technical limitations. In many cases, the attacks themselves are limited to someone spoofing someone else’s account and then asking for account details in an otherwise open chatroom. As long as people don’t ever put their contact details into a form that is run by someone other than the people providing a service, these attacks are unlikely to take place. Technical staff are primarily working to educate consumers about the danger of sharing credentials.

Individual users who are looking to do something in the meantime might want to explore other options. Few commercial-grade security products are robust enough to deal with these new threats, so they may wish to look at Lifelock alternatives for identity theft protection, which may offer features not seen in more popular applications. These can help users to mitigate the damage done if they’ve found themselves in a spot after providing contact information to a fraudulent recipient.

Some may be surprised that people continue to fall afoul of these kinds of schemes in 2021, especially considering how much attention has been paid to them in the past. Bad actors have a new trick up their sleeves that’s making it easier to fool even jaded netizens, however.

Convincing People to Surrender their Details

Once a person has had an account stolen for whatever reason, bad actors could potentially do a fairly good job of acting as them. By using special Unicode characters, they could make a fraudulent URL look like it actually came from the servers of the app in question, which could ensure that even the most seasoned of users may give up their credentials. Security specialists have begun looking at ways to tighten up the Unicode text protocols to reduce the risk of this happening.

In the meantime, users are asked to be vigilant and ask themselves whether someone would actually need a password or other information after they’re already logged into an app.

TAGGED: cybersecurity, meeting-based cyberattacks
Philip Piletic September 23, 2021
Share this Article
Facebook Twitter Pinterest LinkedIn
Share
By Philip Piletic
Follow:
His primary focus is a fusion of technology, small business, and marketing. Author, editor, and tech junkie, in love with startups, traveling and helping others get their ideas off the ground. Unwinds with a glass of scotch and some indie rock on vinyl.

Follow us on Facebook

Latest News

ai in automotive industry
AI Is Changing the Automotive Industry Forever
Artificial Intelligence
SMEs Use AI-Driven Financial Software for Greater Efficiency
Artificial Intelligence
data security in big data age
6 Reasons to Boost Data Security Plan in the Age of Big Data
Big Data
data science anayst
Growing Demand for Data Science & Data Analyst Roles
Data Science

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

You Might also Like

cybersecurity simulations
Artificial IntelligenceExclusiveITSecurity

Combat AI-Powered Threats with Cybersecurity Simulations & Other Practices

7 Min Read
anti-spoofing tips
Security

Anti-Spoofing is Crucial for Data-Driven Businesses

6 Min Read
Cybersecurity Plan
Security

How to Plan a Cybersecurity Strategy for Your Small Business

8 Min Read
machine learning can be trained to stop cyberattacks
Security

ML is a Vital Defense Against Thwart Digital Attack Surfaces

9 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US

© 2008-23 SmartData Collective. All Rights Reserved.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?