{"id":16227,"date":"2026-04-13T14:38:46","date_gmt":"2026-04-13T02:38:46","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=16227"},"modified":"2026-04-13T14:38:46","modified_gmt":"2026-04-13T02:38:46","slug":"when-legitimate-tools-are-used-illegitimately-like-booking-a-meeting-time","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=16227","title":{"rendered":"When \u201cLegitimate\u201d Tools Are Used Illegitimately (like booking a meeting time)"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2><strong>Cyber awareness isn\u2019t just about blocking malware \u2014 it\u2019s about recognising intent.<\/strong><\/h2>\n<p>Recently, we received a callout from a client after a user received what initially appeared to be a genuine business opportunity. The email exchange seemed credible, replies were exchanged, and eventually a <strong>Calendly booking link<\/strong> was provided to schedule a meeting.<\/p>\n<p>At first glance, nothing appeared overtly malicious.<\/p>\n<p>However, the user became suspicious after clicking the link and contacted us for verification. That decision mattered.<\/p>\n<h3>What we found<\/h3>\n<p>Our investigation showed:<\/p>\n<ul>\n<li>The booking link itself was a <strong>legitimate Calendly link<\/strong><\/li>\n<li>There was <strong>no malware<\/strong>, no fake login page, and no credential harvesting form<\/li>\n<li>Calendly was operating <strong>exactly as designed<\/strong><\/li>\n<\/ul>\n<p>But there was a critical red flag.\u00a0\u00a0The <strong>sender\u2019s email domain was only 21 days old<\/strong>, and the domain had <strong>no valid or functional website<\/strong> behind it.\u00a0\u00a0This was not a failed attack \u2014 it was <strong>pre\u2011attack reconnaissance<\/strong>.<\/p>\n<h2>Understanding the Technique: Trust Before the Attack<\/h2>\n<p>This scenario highlights a growing technique we\u2019re seeing more frequently: <strong>using trusted, legitimate platforms to lower defences<\/strong>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#222222&#8243; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3>What this attack is <em>not<\/em><\/h3>\n<ul>\n<li>No exploit<\/li>\n<li>No malicious payload<\/li>\n<li>No impersonated Calendly infrastructure<\/li>\n<li>No credential prompt<\/li>\n<\/ul>\n<p><strong>There is nothing to \u201cblock\u201d in the traditional sense.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&quot;2_5&quot; _builder_version=&quot;4.27.6&quot; _module_preset=&quot;default&quot; border_radii=&quot;on|10px|10px|10px|10px&quot; border_width_all=&quot;1px&quot; border_color_all=&quot;#222222&quot; box_shadow_style=&quot;preset1&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;][et_pb_image src=&quot;https:\/\/new.kinetics.co.nz\/wp-content\/uploads\/2026\/04\/CalendarHacker.png&quot; title_text=&quot;CalendarHacker&quot; _builder_version=&quot;4.27.6&quot; _module_preset=&quot;default&quot; hover_enabled=&quot;0&quot; box_shadow_style=&quot;preset1&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot; align=&quot;center&quot; sticky_enabled=&quot;0&quot;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&quot;4.27.6&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;][et_pb_column type=&quot;4_4&quot; _builder_version=&quot;4.27.6&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;][et_pb_text _builder_version=&quot;4.27.6&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;]<\/p>\n<h3>What the attacker is actually doing<\/h3>\n<p>The real objective here is <strong>verified lead harvesting and trust building<\/strong>.\u00a0\u00a0By using Calendly, the attacker can:<\/p>\n<ul>\n<li>\n<p><strong>Harvest validated contact data<\/strong><\/p>\n<ul>\n<li>Name<\/li>\n<li>Email address<\/li>\n<li>Company<\/li>\n<li>Sometimes role or phone number<\/li>\n<\/ul>\n<\/li>\n<li>\n<p><strong>Confirm human engagement<\/strong><\/p>\n<ul>\n<li>Booking a meeting confirms the mailbox is real, monitored, and responsive<\/li>\n<li>This signals high intent and lowers future suspicion<\/li>\n<\/ul>\n<\/li>\n<li>\n<p><strong>Build legitimacy<\/strong><\/p>\n<ul>\n<li>\u201cThey booked time with me\u201d reframes future contact as <em>expected<\/em> rather than unsolicited<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>In short: <strong>Calendly is the reconnaissance phase<\/strong>, not the attack itself.<\/p>\n<p>&nbsp;<\/p>\n<h2>Why this matters<\/h2>\n<p>Traditional security controls are excellent at stopping malware, phishing links, and credential theft, but <strong>this technique doesn\u2019t trigger those alarms<\/strong>.<\/p>\n<p>That\u2019s why <strong>cyber awareness training<\/strong> and a <strong>layered security approach<\/strong> are essential.<\/p>\n<ul>\n<li>Technology reduces risk<\/li>\n<li>Awareness identifies intent<\/li>\n<li>People close the gap<\/li>\n<\/ul>\n<p>In this case, the outcome was positive because the user trusted their instincts and escalated early.<\/p>\n<h2>The takeaway<\/h2>\n<p>If something feels <em>slightly off<\/em>, even when all the tools look legitimate.\u00a0 Pause and verify.\u00a0\u00a0That pause is often the difference between <strong>early detection<\/strong> and <strong>incident response<\/strong>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber awareness isn\u2019t just about blocking malware \u2014 it\u2019s about recognising intent. Recently, we received a callout from a client after a user received what initially appeared to be a genuine business opportunity. The email exchange seemed credible, replies were exchanged, and eventually a Calendly booking link was provided to schedule a meeting. At first [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":16228,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-16227","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/16227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16227"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/16227\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}