Technology
How I almost fell for a Microsoft 365 Calendar invite scam
NEWYou can now listen to Fox News articles!
There’s a new phishing scam that’s sneaking past inbox filters in unexpected ways. Instead of sending suspicious links or obvious malware, this one uses something most people trust: calendar invites. Microsoft 365 and Outlook users are being targeted by a tactic that injects fake billing alerts directly into their calendars. Sometimes it includes malicious attachments, but in other cases, it exploits the default settings of calendars. Paul from Cape Coral, Florida, wrote us to share his experience:
“I had a very disturbing experience with a phishing attempt that almost had me hooked. I’m a Microsoft 365 subscriber and recently got the usual renewal emails. But a few days later, I started getting meeting invites saying my payment failed — they showed up directly on my calendar, even though I never opened or clicked anything. I got nervous when I tried to delete them and saw the only option was ‘delete and decline,’ which might have triggered a response to the attacker. I’ve never seen anything like this before.”
Paul verified his subscription status and avoided interacting with the event, which was the safest move, but his story highlights how easily this type of scam can slip through. Here’s how the attack works, and what to do if it shows up on your calendar.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.
A woman using Microsoft 365 calendar. (Kurt “CyberGuy” Knutsson)
How the Microsoft 365 calendar invite scam works
This type of phishing combines fake calendar events, Microsoft branding, and social engineering tactics to trick users into handing over personal information or clicking on malicious content.
It starts with a fake billing alert: The message appears to be from Microsoft 365, warning that your subscription renewal has either failed or been renewed. Some versions include an .htm attachment designed to look like a billing portal that captures credit card details.
The calendar invite adds pressure: Many of these scams include a calendar file (.ics) that places the event directly on your calendar. If your Microsoft 365 or Outlook settings automatically accept invites, the event appears without you doing anything.
The event looks official: Titles like “Payment Failed” or “Account Suspended” are used to trigger a quick reaction. Even if you never click a link, just seeing the event may prompt panic or confusion.
Deleting can confirm your identity: If your only option is “Delete and Decline,” that sends a response back to the sender. This confirms that your email is active and being monitored, which makes you a bigger target.
Scammers use compromised domains: These events often come from addresses that appear legitimate at a glance but are actually sent through hijacked third-party domains like .shop sites. Some even pass basic security checks, making them harder to detect.
Why Microsoft 365 phishing invites bypass email filters
This tactic is effective because it exploits a loophole in how Microsoft 365 processes calendar invitations. Even if a phishing email is flagged or blocked, the calendar event associated with it can still appear on your calendar. Here’s how:
It bypasses traditional email filters: Tools like Microsoft Defender scan incoming messages for bad links and attachments, but in this case, the attacker sends a malicious calendar invite that gets processed by Microsoft’s backend calendar services. So even if the email itself gets caught, the event still lands on your calendar.
You don’t have to click or open anything: If your settings allow calendar invites to be added automatically, that fake billing alert can show up instantly, making it feel urgent and legitimate, especially when it looks like it’s from Microsoft.
It exploits trust in internal tools: Because the invite appears inside Microsoft 365 or Teams, tools you use every day, it feels more “real” than an email from a random domain. That trust is exactly what scammers are counting on.
Microsoft 365. (Kurt “CyberGuy” Knutsson)
What to do if you get a phishing calendar invite in Microsoft 365
If a suspicious calendar event shows up and you didn’t accept it yourself, do not interact with it. Don’t click links, don’t download attachments, and don’t decline the invite; even that response can confirm your email is active.
Outlook is Microsoft’s interface for managing email and calendar events, and it comes in several different versions. The instructions below cover all three:
- New Outlook: The modern web-based and desktop app bundled with Microsoft 365 (formerly Office 365). Most users on Microsoft 365 today are using the new Outlook.
- Classic Outlook: The older desktop version (common in corporate setups) with more granular calendar settings.
- Outlook.com: The free personal version of Outlook that you access through a web browser. It shares many features with the new Outlook, but some settings are unique to the web version.
Most people using Microsoft 365 today are on the new Outlook. Here’s what to do next, depending on your version:
A woman using Microsoft 365 on her laptop. (Kurt “CyberGuy” Knutsson)
1) Don’t click or decline the phishing calendar invite
It might be tempting to hit “Decline” and move on, but that can actually send a response back to the attacker, letting them know your account is active. Previewing the event is generally safe, but avoid clicking links, opening attachments, or interacting with it in any way.
2) How to delete a phishing calendar event without alerting the attacker
New Outlook (desktop or web): This version no longer offers a “delete without response” option from the calendar view, making it trickier to handle suspicious invites. Here’s what you can do instead:
- Option 1: Leave it alone – If the event is already on your calendar and there’s no inbox email to ignore, your safest bet is to leave it untouched. Even if you uncheck “Email organizer,” it still logs your RSVP. In the new Outlook, there’s no way to fully disable this tracking.
Option 2: Use “Ignore” from the inbox – This won’t necessarily remove the event from your calendar, but it’s a helpful way to get rid of the email without sending a response.
- Go to your Inbox view (not your calendar)
- Find the calendar invite email
- Right-click and choose Ignore
This will move the email to your Trash without sending any response or showing RSVP tracking. However, in some cases, the event may remain on your calendar, and you can delete it manually afterward. Based on testing, this usuallydoesn’t notify the sender, but there is still no guarantee that RSVP tracking is avoided. If the invite is still on your calendar, the safest approach is to leave it.
Note: The “Ignore” option is only available in the inbox/mail view. If you try to manage the invite from the calendar view, your only options are Accept, Tentative, or Decline, all of which either notify the sender or leave behind RSVP tracking.
Classic Outlook desktop (older version)
This version still gives you a clean, no-reply option:
- Right-click the event in your calendar
- Choose Delete
- Select “Do not send a response” when prompted
This removes the invite without alerting the sender or recording your RSVP.
3) Change Outlook settings to block calendar spam and phishing invites
New Outlook
Unfortunately, there is no way to prevent meeting invites from being automatically added to your calendar. Microsoft removed this control in newer versions, and users can only limit certain types of “Events from email” (such as travel reservations), not actual meeting invites.
Classic Outlook desktop
You can limit auto-processing of invites so Outlook doesn’t automatically add them:
- Go to File > Options > Mail
- Scroll to the Tracking section
- Uncheck “Automatically process meeting requests and responses to meeting requests and polls”
This doesn’t block invites completely, but it stops Outlook from acting on them without your input.
4) How to report a phishing calendar invite without alerting the sender
If the event also appeared in your inbox, you can report it using Outlook’s built-in phishing tool.
New Outlook
- Select the invite from your inbox
- In the toolbar ribbon, go to Home > Report > Report phishing
- Or right-click the email and choose Report > Phishing
Do not forward the invite from the calendar, as this may notify the sender and confirm your account is active.
If the phishing report button doesn’t work, you can email a report to phish@office365.microsoft.com. To do this safely:
- Open the email in your inbox view
- Click the three dots on the top right of the message
- Select Other reply actions > Forward as attachment
This method forwards the email as an attachment, avoiding the risk of sending the actual invite and notifying the sender.
Classic Outlook
- Go to your Inbox
- Open the calendar invite email (don’t just select it from the inbox)
- In the top ribbon, click Report phishing or Report message
To manually forward it to Microsoft:
- Open the email in your Inbox view
- Click the three dots on the top right of the message > Forward as attachment
- Send to phish@office365.microsoft.com
Again, do not forward directly from the calendar. Always forward from the inbox view using “Forward as Attachment” to avoid interacting with the calendar invite or notifying the sender.
5) Check your Microsoft account for signs of phishing or hacking and install strong antivirus
Even if you didn’t interact with the invite, it’s smart to review your account just in case:
- Go to mysignins.microsoft.com
- Review your recent sign-ins and devices
- Change your password if anything looks off
- Make sure two-factor authentication (2FA) is turned on
Once you’ve checked your account activity, it’s also worth strengthening your defenses moving forward. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech.
6) Monitor your identity after a phishing attempt
If your email or login info has been exposed, scammers may try again later. Use an identity protection service to scan the dark web for leaked credentials and alert you before they can be misused.
Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft.
7) Remove your personal info from data broker sites to avoid future scams
Scammers often buy personal information from data broker sites, which makes it easier for them to target you again later. A removal service can help stop that by automatically scanning and deleting your data from hundreds of these sites.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.
Kurt’s key takeaways
If a suspicious event suddenly shows up on your calendar, avoid interacting with it. That means no clicking, no declining, and no replies of any kind. Just opening the event is usually safe, but responding in any way can let scammers know your account is active. The new Outlook versions make this harder to manage, so the safest move is to leave the event alone, report it from your inbox, and double-check your account security. Until Microsoft adds stronger controls, calendar scams will continue to sneak through, but a few careful steps can keep you protected.
What responsibility does Microsoft have to protect users from security flaws in its own ecosystem, especially when default settings can expose people to phishing attacks without their knowledge? Let us know by writing to us at Cyberguy.com/Contact.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
SpaceX cuts a deal to maybe buy Cursor for $60 billion
SpaceX and Cursor are now working closely together to create the world’s best coding and knowledge work AI.
The combination of Cursor’s leading product and distribution to expert software engineers with SpaceX’s million H100 equivalent Colossus training supercomputer will allow us to build the world’s most useful models.
Cursor has also given SpaceX the right to acquire Cursor later this year for $60 billion or pay $10 billion for our work together.
Technology
Fake Windows update installs hidden malware
NEWYou can now listen to Fox News articles!
If you’ve ever clicked “Check for updates” and trusted what you saw, you’re not alone. That’s exactly what this latest scam is counting on.
The page mimics official branding, includes a believable knowledge base number and presents a big blue download button that feels familiar.
The catch? The download installs malware designed to steal passwords, payment details and account access.
According to researchers at Malwarebytes Labs, a cybersecurity research and threat intelligence team inside Malwarebytes, the site uses a typosquatted domain that looks close enough to a real Microsoft URL to fool a quick glance. That small trick is often all it takes.
APPLE APP PASSWORD SCAM EMAIL WARNING
Cybersecurity researchers warn a fake Microsoft update site uses a look-alike URL and a familiar download button to deliver data-stealing malware. (Michael Nagle/Bloomberg via Getty Images)
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Why this fake Windows update malware slips past detection
At first glance, nothing seems off. The file looks like a standard Windows installer. It even lists “Microsoft” in its properties. That’s where this attack gets clever. Instead of using obvious malicious code, the attackers built the installer with legitimate tools and layered the attack in stages. Each piece looks harmless on its own.
Here’s what’s happening behind the scenes:
- The installer launches what appears to be a normal app
- That app quietly runs hidden scripts
- A disguised process loads a full Python environment
- Data theft tools activate in the background
Because each step looks routine, many security tools fail to flag it right away. Researchers also noted that antivirus engines initially showed zero detections for key parts of the attack. That does not mean the file is safe. It means the malicious behavior is well hidden.
What this fake Windows update malware is stealing
Once installed, the malware gets to work fast. It collects details about the infected device, including location and IP address. Then it reaches out to remote servers to receive instructions and upload stolen data.
The targets include:
- Saved browser passwords
- Login sessions and cookies
- Payment details
- Discord account tokens
It even tries to shut down other processes on your system to avoid interference while it works. In some cases, it modifies apps like Discord to intercept account activity in real time.
How the fake Windows update malware stays on your system
This malware is designed to stick around. It creates entries that look like normal system processes, so they blend in. One registry entry mimics Windows Security Health, which most users would ignore. It also drops a shortcut in your startup folder with a familiar name like Spotify. That makes it easy to overlook. Two different persistence tricks mean it can survive a reboot and keep running.
FAKE WINDOWS UPDATE PUSHES MALWARE IN NEW CLICKFIX ATTACK
A fake Windows update page is tricking users into downloading malware that steals passwords, payment details and account access. (Beata Zawrzel/NurPhoto)
Why this fake Windows update scam feels so real
There’s a bigger trend behind this. Researchers say campaigns like this often target regions where large data breaches have already exposed personal information. When attackers already know your name, provider or habits, they can build scams that feel tailored to you. That makes a fake Windows update page far more believable than a generic phishing email.
It also highlights something important. Today’s malware often hides inside legitimate tools and trusted frameworks. That makes it harder to detect and easier to trust. This campaign shows how far scammers have come. They are no longer relying on sloppy emails or obvious fake links. Instead, they are building layered attacks that look and behave like trusted software.
Even experienced users can get caught off guard when everything appears normal. The biggest takeaway is simple. A clean scan result or a familiar interface does not guarantee safety.
Microsoft says it’s aware of the threat
Microsoft confirmed it is tracking this type of activity and urges users to be cautious when downloading updates from unfamiliar sources.
“We are aware of reports of fraudulent websites impersonating Microsoft, and we actively work to detect and disrupt malicious activity across the internet,” A Microsoft spokesperson told CyberGuy. “We encourage customers to be cautious of unexpected prompts or downloads and to verify that they are interacting with legitimate Microsoft domains. As a best practice, we recommend users verify the legitimacy of a link by going directly to our website from your own saved favorite, from a web search, or by typing the domain name yourself.”
For more guidance on how to protect against online phishing scams, you can refer to Microsoft’s official support page at support.microsoft.com.
MICROSOFT CROSSES PRIVACY LINE FEW EXPECTED
A convincing Windows update scam is spreading malware that can grab saved passwords, cookies, payment data and Discord tokens. (Todor Tsvetkov/Getty Images)
Ways to stay safe from fake Windows update malware
You don’t need to be a security expert to avoid this. A few habits make a big difference.
1) Only update Windows from your settings
Go to Settings > Windows Update and check for updates there. Avoid downloading updates from websites.
2) Double-check the URL
Real Microsoft pages use microsoft.com. Anything else, even if it looks close, should raise a red flag.
3) Be cautious with urgent update prompts
If a site or message pressures you to install an update, stop and verify it manually.
4) Use strong antivirus software with behavior detection
Traditional antivirus software, which often comes built into your device or as basic security software, mainly looks for known threats using signature matching, which means it can miss new or well-hidden attacks like this one. Strong antivirus software uses behavior detection to monitor what programs are doing in real time, helping flag suspicious activity even if the malware hasn’t been seen before. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
5) Use a data removal service to limit your exposure
If your personal information is already circulating online from past breaches, it can make scams like this more convincing. A data removal service helps reduce how much of your information is publicly available, making it harder for attackers to target you with tailored phishing attempts. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
6) Turn on two-factor authentication
Two-factor authentication (2FA) adds a second layer of protection if your passwords are stolen.
7) Avoid downloading installer files from unknown sites
Legitimate updates rarely require manual downloads.
Kurt’s key takeaways
Fake updates are one of the most effective tricks because they tap into something we all trust. Keeping your system secure should not put you at risk, yet that’s exactly what attackers are exploiting here. The safest move is to slow down, verify where updates come from and stick to built-in tools whenever possible.
Are tech companies doing enough to keep fake updates from putting your data at risk? Let us know your thoughts in the comments below. Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The Vergecast Vergecast, 2026 edition
We get a lot of questions about how The Verge works. And how The Vergecast works. And how we make money. And whether some of that money helps Nilay buy more jackets, several yachts, or something else entirely. So, every once in a while, we spend an episode of the podcast answering as many questions as we can.
On this episode of The Vergecast, Nilay and David are joined by The Verge’s publisher, Helen Havlak, to talk about ads, subscriptions, our website, our audience, and more. Then, Nilay and David answer some more questions about how we think about journalism, our relationship with Verge alumni, video podcasts, and (of course) Brendan Carr.
Thanks to everyone who sent us questions for this episode, and please keep them coming! You can always call the Vergecast Hotline (866-VERGE11) or send us an email (vergecast@theverge.com) with your questions, thoughts, feelings, and misgivings about everything we’re up to. We truly love hearing from you. And if you want to be part of everything we’re up to, and help make The Verge even bigger and better, the best thing you can do is subscribe! You even get all our podcasts ad-free.
Oh, and also, in case you missed it yesterday, be sure and check out our emergency pod on the news that Tim Cook is stepping down as Apple CEO. We’ll be talking more about the future of Apple on Friday’s show, too, so send questions if you have ’em!
-
Austin, TX2 minutes agoAppeals court rules Texas can require public schools to display Ten Commandments in class
-
Alabama8 minutes agoAlabama Defeated By Birmingham
-
Alaska14 minutes agoHawaiian, Alaska reservation systems merge: Big changes for travelers start April 22
-
Arizona20 minutes agoMichigan defenseman Hunter Hady transfers to Arizona State
-
Arkansas26 minutes ago
#24 Arkansas Explodes for Eight Runs in Eighth to Race past Missouri State in Midweek Rematch
-
California32 minutes agoCalifornia Islamic calligraphy artist preserves ancient tradition during Arab American Heritage Month
-
Colorado38 minutes agoAvalanche vs. Kings Game 2: Key takeaways as Colorado wins OT thriller, takes 2-0 series lead
-
Connecticut44 minutes agoOpinion: This Earth Day make polluters pay