{"id":13223,"date":"2022-11-21T12:00:44","date_gmt":"2022-11-21T11:00:44","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=13223"},"modified":"2022-11-21T12:05:45","modified_gmt":"2022-11-21T11:05:45","slug":"gefaelschte-termineinladungen","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2022\/11\/21\/gefaelschte-termineinladungen\/","title":{"rendered":"Beware of Meeting Invite Phishing Scam!"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_13223 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_13223')){$('.twoclick_social_bookmarks_post_13223').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2022\\\/11\\\/21\\\/gefaelschte-termineinladungen\\\/\",\"post_id\":13223,\"post_title_referrer_track\":\"Beware+of+Meeting+Invite+Phishing+Scam%21\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_13228\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/Bild1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13228\" class=\"size-medium wp-image-13228\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/Bild1-300x168.png\" alt=\"Laptop in front of orange background with incoming e-mail\" width=\"300\" height=\"168\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/Bild1-300x168.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/Bild1-768x431.png 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/Bild1.png 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-13228\" class=\"wp-caption-text\">Source: Own illustration<\/p><\/div><\/p>\n<p>The way we work together has changed fundamentally in recent years. Among the major changes is the shift of work processes to the home office. Not only have everyday tasks had to be shifted into virtual space, but also the entire communication process. This is how online meetings and video conferencing became a central part of our working lives. The digitization of these work processes brings many benefits. However, it also confronts many companies and organizations with major challenges. One of these challenges is the drastic increase in cyber attacks. As is so often the case, Internet fraudsters have taken advantage of the new situation and quickly developed a variety of new types of fraud methods. These include, for example, phishing attempts via appointment invitations.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">How Does Phishing by Meeting Invite Work?<\/span><\/h3>\n<p>In this scam, recipients are sent an email inviting them to online meetings and video conferences. These emails encourage the recipient to click on a link, for example, to confirm their participation or to provide their personal data. The scam is particularly insidious if the event mentioned in the email is a real event or conference. When skimming the email, recipients encounter content they are familiar with and are lulled into a false sense of safety. This safety then often leads to inattention.<\/p>\n<p>Invitations to supposedly ordinary online meetings can also bear dangers. In addition to the options to accept or decline the appointment, the appointment also contains a shortcut to access the meeting. This link may hide applications that are intended to infect the system and intercept sensitive data. Such emails might also contain information that the account has been suspended or that a meeting has been missed. Recipients are then asked to click on a link to reactivate their account or get more information about the missed event.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">What You Should Always Keep in Mind When Receiving Invitations to Meetings per Mail:<\/span><\/h3>\n<p>There is one rule you should follow, and it is probably the most important one: never click on anything without proper consideration. This applies to links as well as files or other content, such as photos, which may also be clickable. For links, always check the associated URL address.<\/p>\n<p>Be sure to take the time to look closely at any request and question its content. For example, many phishing emails may contain grammatical and spelling errors. Phishing emails may also show unusual formatting. Any inconsistency could be an indication of a fake email. So always keep your eyes open.<\/p>\n<p>If, after thoughtful examination, you are still in doubt, it is highly recommended that you browse the Internet for official contact persons and contact these persons personally, for example by phone.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">I Have Received a Fake Meeting Invitation. What should I do?<\/span><\/h3>\n<p>Should you receive a fake conference or appointment invitation, or if an invitation seems suspicious to you, you should always report the case to the appropriate department. In case of suspicious invitations to a RWTH email address, forward us the relevant invitation email as an attachment (!!) to both servicedesk@itc.rwth-aachen.de and spam@access.ironport.com.<\/p>\n<p>Every <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2020\/11\/04\/phishing\/\">phishing<\/a> attempt we know about enables us to collect important information and take appropriate security measures. You want to learn more about IT security and fraud methods on the Internet? You can find an overview of all our posts on this topic under the <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/tag\/it-sicherheit\/\">IT security<\/a> tag. Help us make the internet a safer place!<\/p>\n<p>&nbsp;<\/p>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/IT-Center\/IT-Center\/Team\/~epvp\/Mitarbeiter-CAMPUS-\/?gguid=0x2C5E1B0A3DA32A45AB293A42E93EEC07&amp;allou=1&amp;lidx=1\">St\u00e9phanie Bauens<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":3531,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[305],"tags":[81,61,70,49],"class_list":["post-13223","post","type-post","status-publish","format-standard","hentry","category-themen","tag-it-security","tag-it-sicherheit","tag-phishing","tag-spam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/13223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/3531"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=13223"}],"version-history":[{"count":8,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/13223\/revisions"}],"predecessor-version":[{"id":13234,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/13223\/revisions\/13234"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=13223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=13223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=13223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}