Calendly... The Latest Cyber Weapon. Let's Look At How Fake Meeting Invites Are Being Used To Hijack Business Ad Accounts at Scale.
Jim Leone
12/4/20253 min read
Calendly is one of the most trusted scheduling tools in business. We use it to coordinate vendor calls, interviews, demos, and everything in between. That trust, and our instinct to click without suspicion, has made Calendly the latest battleground in a highly targeted phishing campaign now impersonating over 75 major global brands, including Disney, MasterCard, LVMH, Uber, and Unilever.
According to new reporting from Push Security, attackers are weaponizing fake Calendly meeting invites to steal Google Workspace and Facebook Business Manager credentials, giving them unrestricted access to corporate ad accounts, executive data, and in some cases, enterprise systems tied to SSO. This campaign isn’t sloppy. It’s not the “Nigerian prince” email. It is professional, AI-crafted, brand-accurate, and psychologically engineered to succeed.
And it’s working...
Marketing & Ad Accounts Are Suddenly High-Value Targets
Most organizations don’t realize how lucrative a compromised marketing account can be for cybercriminals.
1. Direct access to advertising platforms -->
A hijacked Google or Facebook ad account can be used to:
Launch malvertising campaigns
Funnel traffic to AiTM phishing sites
Distribute malware
Run ClickFix attacks
Spread impersonation ads targeting customers
Attackers can spend your ad dollars to run their campaigns.
2. Deep SSO & enterprise connectivity -->
Many marketing accounts tie directly into:
Google Workspace
Slack
CRM systems
SharePoint
IdP-integrated SaaS applications
Meaning a compromised ad manager account may provide a privileged pivot into your enterprise.
3. Lower security maturity -->
Marketing tools often slip through the cracks:
Weak or missing MFA
Shared team accounts
Poor logging
Limited SOC visibility
Less security awareness training than IT or finance
Attackers know this, and they capitalize on it!
4. High resale value -->
Compromised business accounts are quickly sold on underground markets. A single Google Ads or Facebook Business account can fetch hundreds, sometimes thousands, of dollars.
Inside the Attack... How Fake Calendly Invites Hijack Trust
This campaign follows a simple but brutally effective playbook-->
Step 1: Impersonate a recruiter from a top-tier brand
Attackers scrape public profiles and spoof legitimate recruiters, complete with:
Real names
Accurate titles
Real corporate branding
AI-generated headshot variants
It’s polished enough that even trained professionals pause before questioning it.
Step 2: Send a Calendly-style meeting invite
The email:
Looks exactly like a legitimate Calendly template
Uses believable context (interview opportunity, partnership discussion, vendor evaluation)
Leverages brand trust to bypass suspicion
The victim believes they’re scheduling a legitimate call.
Step 3: Redirect victims to a phishing page
The landing page:
Is branded to match the impersonated company
Spoofs a recruiter’s real profile
Prompts the victim to “sign in with Google” or “sign in with Facebook”
Captures credentials instantly
Many of these pages include AiTM (Adversary-in-the-Middle) code to bypass MFA.
Step 4: Immediate account takeover
Once inside, attackers move fast:
Change recovery emails
Disable notifications
Export account details
Deploy malicious ads or scripts
Scout linked enterprise services
In a matter of minutes, they weaponize the environment.
Why These Attacks Are Working
This campaign succeeds because it exploits three things:
1. Trust in familiar platforms
Calendly is universally recognized. People trust it. That trust is now being used against us.
2. AI-enhanced phishing sophistication
Attackers are using AI to:
Mimic writing tone
Create flawless branding
Generate deepfake headshots
Personalize messaging at scale
The result... phishing emails more polished than many real corporate emails.
3. Security blind spots around marketing systems
Most SOCs:
Don’t monitor ad accounts
Don’t enforce MFA in marketing tools
Don’t have logging on these platforms
Don’t integrate them into their SIEM
Don’t provide role-specific training to marketing teams
This is a systemic gap, and attackers have found it.
The Real Business Impact...
A compromised marketing environment can lead to-->
Fraudulent ad spend costing companies tens of thousands in hours
Brand damage from ads impersonating your executives or products
Customer targeting with malware-laced ads
Account pivoting, especially if Google Workspace is tied to enterprise systems
Legal and regulatory exposure, especially around privacy violations or malware distribution
This isn’t a minor issue, it’s a full-scale enterprise risk.
Suggestions On How to Protect Your Organization (and Your Family)...
These protections apply not only to businesses, but to individuals receiving “job interview” or “meeting request” invites.
For Businesses
Enforce MFA on -->
Google Workspace
Facebook Business Manager
LinkedIn Business
All marketing tools
Block personal account sign-ins on corporate-managed browsers/devices.
Add marketing systems to SOC monitoring Include Google Ads and Facebook Ads in SIEM ingestion and alerting.
Train HR and Marketing teams They are now front-line targets.
Validate all recruiter or partner meeting invites manually When in doubt, call the company directly.
Implement SSO with strong conditional access This reduces entry points dramatically.
For Individuals & Families...
Verify meeting invites outside the invite (LinkedIn message, company website).
Avoid clicking login links in emails, visit the service manually.
Be suspicious of “urgent interview invitations.”
Never sign in to Google or Facebook from unfamiliar links.
Teach teens and college-age job hunters: recruiter phishing is now mainstream.
Holiday hiring and seasonal job scams will make this even more common.
Cybercriminals don’t need new vulnerabilities, they exploit your daily workflows.
They prey on trust... Trust in platforms... Trust in brands... Trust in processes.
And today, that trust is being weaponized.
As we move into 2026, SOCs and CISOs must expand visibility beyond traditional systems. Marketing and HR workflows are now part of the threat landscape, and these new AI-powered lures make the line between legitimate and malicious harder than ever to spot. This attack wave won’t be the last, but with proper awareness, monitoring, and collaboration across departments, it doesn’t have to be a successful one.
The IP HighWay
Stay updated with the latest IT security news.
info@iphwy.com
© 2025. IPHwy LLC. All rights reserved.



