BIGFISH TECHNOLOGY LIMITED
03 December 2025

Threat Alert: Sophisticated Calendly Phishing Targets Corporate Ad Manager Accounts

Organizations worldwide are facing a new wave of phishing attacks in which cybercriminals send fake Calendly meeting invites impersonating major global brands such as Unilever, Disney, Mastercard, LVMH, and Uber.

The attackers’ primary target: Ad Manager and marketing accounts—high-value assets that can be used to run malicious ads, spread phishing campaigns, and gain deeper access into corporate systems.

 

How the Attack Works: A Meeting Invite That Leads to Account Takeover

The campaign begins with a highly convincing email that appears to be a legitimate meeting invitation. The message may include a real brand logo, professional wording, and details that look authentic enough to pass as communication from a recruiter, partner, or vendor.

Once the victim clicks the link, they are redirected to a fake Calendly page designed to look identical to the real one. The page typically includes steps such as entering an email, completing a CAPTCHA, and continuing with Google Sign-In.

The danger lies here:

  • The link secretly leads to an Attacker-in-the-Middle (AiTM) site
  • Cybercriminals intercept credentials and authentication tokens
  • Even MFA/2FA can be bypassed
  • Some variants use Browser-in-the-Browser (BitB) pop-ups that perfectly mimic legitimate login windows

After gaining access, the attackers can:

  • Hijack Google Workspace accounts, emails, and documents
  • Take over Facebook Business and Google Ads accounts
  • Launch malicious advertising campaigns
  • Sell compromised accounts on underground markets

 

Why This Threat Is Especially Dangerous for Businesses

Corporate advertising accounts are highly valuable because they:

  • Are linked to company billing methods
  • Can create ads that reach large audiences instantly
  • Enable attackers to run phishing or malware campaigns at scale
  • Pose massive financial and reputational risks

Marketing, brand, PR, partnership, and HR teams are particularly vulnerable as they frequently receive meeting invitations and external messages—making these phishing emails harder to detect.

 

Essential Security Measures for Organizations

  1. Use Hardware Security Keys

Replace SMS or app-based 2FA for critical accounts. Security keys (e.g., YubiKey) provide strong protection against AiTM attacks.

  1. Always Check the URL Before Logging In

Do not click login links directly from emails.
If you receive a Calendly link → manually type the official URL into your browser.

  1. Conduct Awareness Training on “Meeting-Invite Phishing”

Targeted training is crucial for teams that engage heavily with external stakeholders.

  1. Enable Anomalous Behavior Alerts

Set up alerts for:

  • New login attempts from unfamiliar devices or geolocations
  • Changes to billing methods in ad accounts
  • Addition of new admin users


  1. Apply Least-Privilege Access

Grant advertising and admin permissions only to users who absolutely need them.

 

Executive Summary

This attack campaign highlights how modern phishing techniques have evolved beyond simple fake emails. By exploiting something as routine as a meeting invitation, cybercriminals can swiftly compromise high-value business accounts and gain deeper access to the organization.

Businesses should act proactively by:

  • Strengthening identity security
  • Training employees on new phishing techniques
  • Protecting advertising and marketing accounts—now prime targets for attackers

Building strong cybersecurity posture and awareness is the most effective way to defend against new, sophisticated phishing threats.

 

#bigfishtechnology #bigfishtec #CyberSecurity #PhishingAlert #ThreatIntelligence #CyberAwareness #AccountTakeover #AdManagerSecurity #BusinessSecurity #DigitalThreats #InfoSec #SecurityBestPractices #CyberFraud #CorporateSecurity #DataProtection #OnlineSafety #CyberRisk