Meeting requests have become a vital tool for scheduling and collaboration. However, this convenience comes with risks, as cybercriminals increasingly exploit fake meeting invites to gain access to sensitive information, disrupt workflows, or even launch phishing attacks.
To help you stay secure, here’s what you need to know about fake meeting requests and how to protect yourself and your organisation.
How Fake Meeting Requests Work
Fake meeting requests are typically sent via email, calendar apps, or messaging platforms. They may appear legitimate at first glance, using details like:
- Impersonation: Posing as a colleague, client, or customer.
- Urgency: Claiming the meeting is critical and requires immediate action.
- Attachments or Links: Adding malicious files or URLs disguised as meeting agendas or Zoom, Teams or Google links.
- Generic Information: Using vague subject lines like “Meeting Request” or “Follow-Up Discussion” to appear relevant.
Once you engage with these invites, attackers may:
- Harvest login credentials.
- Install malware on your device.
- Access confidential information or systems.
Signs of a Fake Meeting Request
Before accepting or responding to any meeting invite, look out for these red flags:
- Unknown Sender: Verify the sender’s email address and identity.
- Spelling Errors: Poor grammar or spelling in the invite is a common sign of phishing.
- Unexpected Requests: Be cautious of invites for meetings you weren’t expecting or can’t confirm.
- Suspicious Links or Attachments: Avoid clicking on links or downloading files until you’ve verified their authenticity.
- Sense of Urgency: Be wary of invites pressuring you to act quickly without providing proper context.
Steps to Protect Yourself
- Verify the Sender: If the invite is unexpected, contact the sender directly through official channels to confirm its legitimacy.
- Check the Details: Review the meeting agenda, time, and participants for accuracy. Genuine meeting requests usually include clear and specific information.
- Avoid Clicking Links: Access meeting platforms (e.g., Zoom, Teams) by navigating directly to their websites rather than clicking on links in invites.
- Enable Multi-Factor Authentication (MFA): Add an extra layer of protection to your accounts to prevent unauthorised access.