Fake Calendly Invites Are Being Used to Hijack Ad Manager Accounts Through Brand Impersonation Campaigns

https://threatcop.com/blog/wp-content/uploads/2023/06/Why-is-Microsoft-favorite-brand-for-impersonation-attack.jpg
https://registrar.wisc.edu/wp-content/uploads/sites/1299/2025/03/PHISHING-ATTEMPT-1-1200x675.png

Cybercriminals have launched a new phishing campaign that uses fake Calendly style meeting invitations to impersonate major global brands. The objective is simple but dangerous. Attackers aim to trick victims into granting access to their advertising management accounts which include Meta Ads Google Ads and other marketing platforms. Once the attackers gain control of these accounts they immediately begin running unauthorized ads costing organizations significant financial losses while enabling the distribution of harmful or fraudulent content.

This campaign demonstrates how threat actors are refining social engineering tactics by blending trusted business tools with corporate brand impersonation. Calendly is widely used for scheduling meetings which gives these malicious invitations a natural sense of legitimacy. When paired with logos of top brands the phishing lures appear highly convincing even to experienced users.


How the Attack Works

https://www.ghacks.net/wp-content/uploads/2010/02/phishing_flow_chart.jpg
https://www.emsisoft.com/en/blog/wp-content/uploads/2019/03/javascript-redirect-blog-568x319.png.webp
https://cdn.prod.website-files.com/5ff66329429d880392f6cba2/67b431fa738d6382d242fe0a_61691f8e49d0063f3a99823e_4%2520Stages%2520of%2520ATO%2520Attacks.png

The attack begins when potential victims receive a meeting invitation that appears to come from a well known organization. The message looks identical to a real scheduling request. It includes a meeting title a proposed time and a call to action prompting the user to confirm or review the details of the meeting.

Clicking the link does not take the user to a real Calendly page. Instead the victim is redirected through a series of attacker controlled websites designed to harvest credentials or trick users into approving third party app permissions. These permission prompts often request access to advertising accounts or business management platforms.

Once the victim unknowingly grants access the attacker immediately gains administrative control over the ad manager account. From there they begin launching unauthorized ad campaigns promoting scams malware distribution sites or fraudulent investment offers.

What makes this attack particularly effective is the use of major corporate brands in the email headers. Victims are more inclined to trust the request when the sender appears to be a large recognizable company. The professionalism of the fake Calendly invitation further reduces suspicion.


Why Ad Manager Accounts Are a High Value Target

https://www.geckoboard.com/uploads/Digital-dashboard-example.png
https://cdn.prod.website-files.com/63d5a7053933d17abb6dcbda/68bfba42c18d5d504b657435_J340_How%20Fintech%20Can%20Protect%20Their%20Ad%20Spend.png
https://cdn.firstbranchcms.com/kcms-structure/ebb64ac6-256c-4648-9638-cb7da270faa0/postImage.jpeg

Ad manager accounts are extremely valuable to cybercriminals because they allow attackers to spend real money through someone else’s business infrastructure. These platforms can deploy large advertising budgets quickly and at scale which makes them an attractive tool for fraud operations.

Once attackers take control of an organization’s advertising account they can:

• Run malicious ad campaigns promoting scams
• Spread malware through deceptive advertisements
• Redirect traffic to phishing pages
• Promote fraudulent investment schemes
• Damage the organization’s reputation and brand integrity

Attackers also commonly adjust account notification settings to hide their activity for as long as possible. By the time the victim notices unusual charges substantial financial damage may already have occurred.


Growing Trend of Phishing Through Productivity Tools

https://www.getmailbird.com/assets/imgs/blog/email-phishing-attacks-protect-inbox/email-phishing-attacks_feature-en.webp
https://kmtech.com.au/wp-content/uploads/2020/11/How-Does-Business-Email-Compromise-Works.jpg
https://it.lbl.gov/wp-content/uploads/sites/18/2025/10/image-3-460x1024.png

The use of productivity tools such as scheduling apps online document platforms and collaboration systems has become a preferred attack method for cybercriminals. These services are visually familiar and trusted by business users making them fertile ground for social engineering.

By mimicking legitimate Calendly invitations attackers bypass traditional email security filters which tend to focus on suspicious attachments or uncommon sender behavior. Since the emails look identical to typical business communication fewer security warnings are triggered.

This campaign is also part of a broader surge in brand spoofing where attackers copy the identity of major companies to create believable phishing lures. Victims mistakenly assume that the communication has undergone corporate level security controls and therefore trust the request without further verification.


How Organizations Can Protect Their Advertising and Business Accounts

https://timely-benefit-e63d540317.media.strapiapp.com/Top_2024_Cybersecurity_Awareness_Training_Trends_671d41fe4a.webp
https://doubleoctopus.com/wp-content/uploads/2021/08/Multi-factor-authentication-1-1.png
https://blog.admindroid.com/wp-content/uploads/2025/10/Essential-Checklist-and-Best-Practices-to-Secure-Your-Active-Directory-1080x567.png

Defending against this attack requires a mix of technical controls and user awareness. Organizations should:

Enable strict multi factor authentication on all business and advertising accounts
Monitor ad account activity for sudden changes in spending behavior
Restrict administrative permissions and use role based access controls
Educate employees about phishing campaigns that mimic scheduling tools
Encourage verification of unsolicited meeting invitations before clicking
Use email security tools capable of detecting brand impersonation patterns

Businesses should also conduct periodic audits of advertising accounts to ensure no unknown apps or third party integrations have been granted access.


Final Analysis

This phishing campaign reinforces a critical truth in cybersecurity. Attackers no longer rely on outdated email lures or crude deception. Instead they exploit trusted business workflows and professional grade branding to create highly convincing attacks. Fake Calendly invitations paired with corporate logo impersonation are effective because they blend seamlessly into daily business operations.

Organizations must train teams to approach every unexpected meeting invitation with caution especially when the link prompts permission approvals or redirects to unfamiliar pages. The theft of advertising accounts is financially damaging and can be exploited to distribute large scale fraud or harmful content. Strong identity protection user training and continuous monitoring are essential to preventing account compromise.

Sign up For Newsletter!!

Leave a Reply

Your email address will not be published. Required fields are marked *


×