iCloud Calendar Abused for Callback Phishing Campaigns
Summary
Hide ▲
Show ▼
A new phishing campaign abuses iCloud Calendar invites to send callback phishing emails. These emails, originating from Apple's servers, bypass spam filters and target users by masquerading as legitimate purchase notifications. The goal is to trick recipients into calling a support number, where scammers attempt to gain remote access to the victim's computer. The emails are sent from [email protected], passing SPF, DMARC, and DKIM checks. The campaign exploits the trust associated with Apple's email servers and the iCloud Calendar service. The phishing emails claim to be payment receipts for fraudulent charges, prompting recipients to contact a provided phone number. Once contacted, scammers use social engineering tactics to gain remote access to the victim's computer, leading to potential financial loss or data theft.
Timeline
-
07.09.2025 20:10 📰 1 articles · ⏱ 9d ago
iCloud Calendar Invites Abused for Callback Phishing Campaigns
A new phishing campaign abuses iCloud Calendar invites to send callback phishing emails from Apple's servers. These emails, originating from [email protected], pass SPF, DMARC, and DKIM checks, making them appear legitimate. The emails target users by masquerading as purchase notifications from PayPal, claiming fraudulent charges. The campaign exploits the trust associated with Apple's email servers and the iCloud Calendar service. The phishing emails prompt recipients to call a support number, where scammers attempt to gain remote access to the victim's computer. The campaign also exploits Microsoft 365 mailing lists to forward the phishing emails, maintaining the legitimacy of the email source.
Show sources
- iCloud Calendar abused to send phishing emails from Apple’s servers — www.bleepingcomputer.com — 07.09.2025 20:10
Information Snippets
-
The phishing emails are sent from [email protected], passing SPF, DMARC, and DKIM checks, making them appear legitimate.
First reported: 07.09.2025 20:10📰 1 source, 1 articleShow sources
- iCloud Calendar abused to send phishing emails from Apple’s servers — www.bleepingcomputer.com — 07.09.2025 20:10
-
The emails are disguised as iCloud Calendar invites, exploiting the trust associated with Apple's email servers.
First reported: 07.09.2025 20:10📰 1 source, 1 articleShow sources
- iCloud Calendar abused to send phishing emails from Apple’s servers — www.bleepingcomputer.com — 07.09.2025 20:10
-
The phishing emails target users by masquerading as purchase notifications from PayPal, claiming fraudulent charges.
First reported: 07.09.2025 20:10📰 1 source, 1 articleShow sources
- iCloud Calendar abused to send phishing emails from Apple’s servers — www.bleepingcomputer.com — 07.09.2025 20:10
-
The emails prompt recipients to call a support number, where scammers attempt to gain remote access to the victim's computer.
First reported: 07.09.2025 20:10📰 1 source, 1 articleShow sources
- iCloud Calendar abused to send phishing emails from Apple’s servers — www.bleepingcomputer.com — 07.09.2025 20:10
-
The campaign exploits Microsoft 365 mailing lists to forward the phishing emails, maintaining the legitimacy of the email source.
First reported: 07.09.2025 20:10📰 1 source, 1 articleShow sources
- iCloud Calendar abused to send phishing emails from Apple’s servers — www.bleepingcomputer.com — 07.09.2025 20:10
-
The phishing emails include a phone number for recipients to discuss or make changes to the alleged payment.
First reported: 07.09.2025 20:10📰 1 source, 1 articleShow sources
- iCloud Calendar abused to send phishing emails from Apple’s servers — www.bleepingcomputer.com — 07.09.2025 20:10
-
The phishing emails are sent to Microsoft 365 email addresses, which are part of a mailing list that forwards the emails to multiple targets.
First reported: 07.09.2025 20:10📰 1 source, 1 articleShow sources
- iCloud Calendar abused to send phishing emails from Apple’s servers — www.bleepingcomputer.com — 07.09.2025 20:10
-
The campaign uses the Sender Rewriting Scheme (SRS) to rewrite the Return-Path, allowing the emails to pass SPF checks.
First reported: 07.09.2025 20:10📰 1 source, 1 articleShow sources
- iCloud Calendar abused to send phishing emails from Apple’s servers — www.bleepingcomputer.com — 07.09.2025 20:10
Similar Happenings
Apple patches Image I/O zero-day exploited in targeted attacks
Apple has released emergency updates to fix a zero-day vulnerability (CVE-2025-43300) in the Image I/O framework. The flaw, an out-of-bounds write issue, was exploited in "extremely sophisticated" targeted attacks against specific individuals. The vulnerability affects multiple iOS, iPadOS, and macOS versions and devices. Apple has not attributed the discovery to a specific researcher or provided details about the attacks. The flaw allows attackers to exploit the vulnerability by supplying malicious input, potentially leading to remote code execution. Affected devices include various iPhone, iPad, and Mac models running specific versions of iOS, iPadOS, and macOS. The flaw was discovered internally by Apple and addressed with improved bounds checking. The vulnerability has been exploited as part of highly targeted attacks. Users are advised to install the updates promptly to mitigate potential ongoing attacks. CERT-FR has reported at least four instances of Apple threat notifications alerting users about mercenary spyware attacks since the beginning of the year. The attacks target individuals based on their status or function, including journalists, lawyers, activists, politicians, and senior officials. Apple has sent threat notifications to users in over 150 countries since 2021. Apple has backported fixes for the vulnerability to older versions of iOS, iPadOS, and macOS, including iOS 16.7.12, iPadOS 16.7.12, iOS 15.8.5, and iPadOS 15.8.5. The updates also address multiple other security flaws in various Apple products. The flaw was chained with a WhatsApp zero-click vulnerability (CVE-2025-55177) in targeted attacks. The attacks were described as "extremely sophisticated" by Apple and WhatsApp. Samsung also patched a remote code execution vulnerability chained with the CVE-2025-55177 WhatsApp flaw in zero-day attacks targeting its Android devices.