{"id":109,"date":"2026-05-15T11:03:24","date_gmt":"2026-05-15T11:03:24","guid":{"rendered":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/"},"modified":"2026-05-15T11:03:24","modified_gmt":"2026-05-15T11:03:24","slug":"calphishing-scam-exploits-outlook-invites-to-steal-m365","status":"publish","type":"post","link":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/","title":{"rendered":"CalPhishing Scam Exploits Outlook Invites To Steal M365"},"content":{"rendered":"<p>A sophisticated phishing campaign is currently exploiting a trusted feature that millions of professionals use daily: calendar invitations. Security researchers have identified a dangerous new threat called CalPhishing that leverages Microsoft Outlook calendar invites to steal Microsoft 365 session credentials. This attack method demonstrates how cybercriminals continue to weaponize legitimate business tools to bypass security measures and target unsuspecting users. Organizations worldwide must understand this emerging threat to protect their digital environments effectively.<\/p>\n<h2>What Happened<\/h2>\n<p>The CalPhishing campaign represents a cunning evolution in social engineering tactics. Attackers are distributing malicious calendar invitations through Outlook that appear to come from legitimate sources within or outside an organization. These calendar invites contain embedded links or attachments that direct recipients to fraudulent login pages designed to harvest Microsoft 365 credentials. The campaign has been linked to the EvilTokens Kit, a sophisticated toolset available on underground forums that enables attackers to create convincing phishing infrastructure with minimal technical knowledge.<\/p>\n<p>What makes this attack particularly effective is its abuse of trust. Calendar invitations typically bypass traditional email security filters because they are considered routine business communications. Recipients often accept these invites without scrutiny, especially when they appear to come from known contacts or legitimate organizations. The attackers craft scenarios such as urgent meeting requests, interview scheduling, or mandatory training sessions that create a sense of immediacy and pressure users to act quickly without proper verification.<\/p>\n<h2>How It Works<\/h2>\n<p>The CalPhishing attack follows a multi-stage process designed to maximize success rates. First, attackers send calendar invitations to targeted individuals using compromised accounts or spoofed identities. These invitations contain compelling subject lines and meeting descriptions that encourage recipients to click embedded links for additional information or to confirm attendance.<\/p>\n<p>When victims click these links, they are redirected to convincing replica login pages that mimic authentic Microsoft 365 authentication portals. These fraudulent pages utilize advanced techniques such as SSL certificates and familiar branding elements to appear legitimate. Once users enter their credentials, the information is immediately captured by the attackers.<\/p>\n<p>The EvilTokens Kit enhances this process by enabling session token theft. Rather than simply capturing passwords, the toolkit harvests active session tokens, which allow attackers to bypass multi-factor authentication protections. With these tokens, cybercriminals can access victim accounts without triggering additional security alerts, remaining undetected while exfiltrating sensitive data, deploying ransomware, or conducting further attacks within the organization.<\/p>\n<h2>What You Should Do<\/h2>\n<p>Organizations and individuals must implement multiple layers of defense against CalPhishing attacks. First, enable advanced email and calendar filtering solutions that can detect suspicious invitation patterns and malicious links. Configure security settings to flag external calendar invitations and require additional verification before displaying them to users.<\/p>\n<p>User education remains critical. Train employees to scrutinize unexpected calendar invitations, especially those containing external links or requesting immediate action. Establish protocols for verifying meeting requests through alternative communication channels before clicking any embedded content.<\/p>\n<p>Implement conditional access policies that restrict session token lifetimes and require periodic re-authentication. Deploy endpoint detection and response solutions that can identify abnormal authentication patterns and suspicious account activity. Regularly audit calendar permissions and review third-party application access to Microsoft 365 environments.<\/p>\n<p>Enable comprehensive logging for all calendar activities and authentication events. Monitor for unusual patterns such as multiple failed login attempts, access from unfamiliar locations, or sudden changes in user behavior that might indicate compromised credentials.<\/p>\n<p>The CalPhishing campaign underscores the ongoing need for vigilance in cybersecurity. As attackers continue developing innovative methods to exploit trusted business tools, organizations must maintain adaptive security postures and foster cultures of security awareness. Protecting against these evolving threats requires combining technical controls with informed user behavior.<\/p>\n<p>Stay protected with CyDhaal. Follow us at cydhaal.com for daily updates.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers now hijacking M365 accounts through Outlook calendar invites. The EvilTokens kit lets attackers steal session tokens and bypass MFA entirely.<\/p>\n","protected":false},"author":1,"featured_media":108,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-109","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersspionage"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CalPhishing Scam Exploits Outlook Invites To Steal M365 - CyDhaal - Your Cyber Dhaal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CalPhishing Scam Exploits Outlook Invites To Steal M365 - CyDhaal - Your Cyber Dhaal\" \/>\n<meta property=\"og:description\" content=\"Hackers now hijacking M365 accounts through Outlook calendar invites. The EvilTokens kit lets attackers steal session tokens and bypass MFA entirely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/\" \/>\n<meta property=\"og:site_name\" content=\"CyDhaal - Your Cyber Dhaal\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-15T11:03:24+00:00\" \/>\n<meta name=\"author\" content=\"CyDhaal Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CyDhaal Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/\"},\"author\":{\"name\":\"CyDhaal Admin\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#\\\/schema\\\/person\\\/0e04b4db0d31604a28212b8978e334e4\"},\"headline\":\"CalPhishing Scam Exploits Outlook Invites To Steal M365\",\"datePublished\":\"2026-05-15T11:03:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/\"},\"wordCount\":615,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-32.jpg\",\"articleSection\":[\"Cyber Espionage\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/\",\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/\",\"name\":\"CalPhishing Scam Exploits Outlook Invites To Steal M365 - CyDhaal - Your Cyber Dhaal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-32.jpg\",\"datePublished\":\"2026-05-15T11:03:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#\\\/schema\\\/person\\\/0e04b4db0d31604a28212b8978e334e4\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-32.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-32.jpg\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/calphishing-scam-exploits-outlook-invites-to-steal-m365\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.cydhaal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CalPhishing Scam Exploits Outlook Invites To Steal M365\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/\",\"name\":\"CyDhaal - Your Cyber Dhaal\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.cydhaal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#\\\/schema\\\/person\\\/0e04b4db0d31604a28212b8978e334e4\",\"name\":\"CyDhaal Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g\",\"caption\":\"CyDhaal Admin\"},\"sameAs\":[\"https:\\\/\\\/blog.cydhaal.com\"],\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/author\\\/jagsinghcansinghgmail-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CalPhishing Scam Exploits Outlook Invites To Steal M365 - CyDhaal - Your Cyber Dhaal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/","og_locale":"en_US","og_type":"article","og_title":"CalPhishing Scam Exploits Outlook Invites To Steal M365 - CyDhaal - Your Cyber Dhaal","og_description":"Hackers now hijacking M365 accounts through Outlook calendar invites. The EvilTokens kit lets attackers steal session tokens and bypass MFA entirely.","og_url":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/","og_site_name":"CyDhaal - Your Cyber Dhaal","article_published_time":"2026-05-15T11:03:24+00:00","author":"CyDhaal Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CyDhaal Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/#article","isPartOf":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/"},"author":{"name":"CyDhaal Admin","@id":"https:\/\/blog.cydhaal.com\/#\/schema\/person\/0e04b4db0d31604a28212b8978e334e4"},"headline":"CalPhishing Scam Exploits Outlook Invites To Steal M365","datePublished":"2026-05-15T11:03:24+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/"},"wordCount":615,"commentCount":0,"image":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-32.jpg","articleSection":["Cyber Espionage"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/","url":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/","name":"CalPhishing Scam Exploits Outlook Invites To Steal M365 - CyDhaal - Your Cyber Dhaal","isPartOf":{"@id":"https:\/\/blog.cydhaal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/#primaryimage"},"image":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-32.jpg","datePublished":"2026-05-15T11:03:24+00:00","author":{"@id":"https:\/\/blog.cydhaal.com\/#\/schema\/person\/0e04b4db0d31604a28212b8978e334e4"},"breadcrumb":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/#primaryimage","url":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-32.jpg","contentUrl":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-32.jpg","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/calphishing-scam-exploits-outlook-invites-to-steal-m365\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.cydhaal.com\/"},{"@type":"ListItem","position":2,"name":"CalPhishing Scam Exploits Outlook Invites To Steal M365"}]},{"@type":"WebSite","@id":"https:\/\/blog.cydhaal.com\/#website","url":"https:\/\/blog.cydhaal.com\/","name":"CyDhaal - Your Cyber Dhaal","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cydhaal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.cydhaal.com\/#\/schema\/person\/0e04b4db0d31604a28212b8978e334e4","name":"CyDhaal Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g","caption":"CyDhaal Admin"},"sameAs":["https:\/\/blog.cydhaal.com"],"url":"https:\/\/blog.cydhaal.com\/index.php\/author\/jagsinghcansinghgmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/posts\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":0,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/posts\/109\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/media\/108"}],"wp:attachment":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/media?parent=109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/categories?post=109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/tags?post=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}