{"id":27162,"date":"2019-06-11T23:54:56","date_gmt":"2019-06-11T23:54:56","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/"},"modified":"2019-06-11T23:54:56","modified_gmt":"2019-06-11T23:54:56","slug":"wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/","title":{"rendered":"Wondering where that upcoming meeting with &#8216;Cheap Viagra&#8217; came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics&#8230;"},"content":{"rendered":"<p>Spammers are abusing the preferential treatment Google affords its own apps to score free passes through Gmail&#8217;s spam filters, it was claimed this week.<\/p>\n<p>The ad giant greases the wheels so that incoming messages involving Google Calendar and other Big-G appsvslide through the filters and appear in Gmail inboxes, to ensure stuff generated and shared via its applications aren&#8217;t silenced by its own webmail product.<\/p>\n<p>This situation, according to Kaspersky bods this week, is being exploited by scam artists to lob spam, phishing pages, and links to malicious malware-flinging websites at netizens, in some cases without triggering Gmail&#8217;s defenses.<\/p>\n<p>&#8220;The spammer\u2019s main task is to bypass the spam filter and deliver email to your inbox,&#8221; Kaspersky analyst Maria Vergelis helpfully <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.kaspersky.com\/blog\/spam-through-google-services\/27228\/\">reminded us<\/a>. &#8220;As it happens, Google services often send email notifications to Gmail inboxes \u2014 and Google\u2019s antispam module avoids flagging notifications from its own services as spam.&#8221;<\/p>\n<p>Because Google usually allows these kinds of notifications through, scammers have found they can schedule a load of events in Google Calendar, inviting Gmail users en masse, and, when the set time draws near, generate a wave of reminders that include spam, phishing links, and so on, at least some of which slips through Gmail&#8217;s filters.<\/p>\n<p>For example, the scammer could send a block of Gmail users a Calendar invite with the description being a link to a fake banking site. Rather than catch and filter out the e-nasty, Gmail would let the notification through and, when the person clicked the link, they would then go to the phony bank page. If the recipient has Calendar set to automatically accept invites, they would even get a pop-up notification of the spam message.<\/p>\n<p>It is not only Calendar that is being gamed by scam artists. Vergelis noted that Google Photos is also a popular method for evading filters. In that case, the spam would either be placed within the image file or its description \u2013 for example the image could be a picture of a check and the description would be instructions on how to claim it, which would typically involve handing over personal information for nothing in return.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/04\/23\/spam_shutterstock.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"spam\"><\/p>\n<h2 title=\"Not a bug, we're told: It's a feature. Really\">It&#8217;s not you, it&#8217;s Big G: Sneaky spammers slip strangers spoofed spam, swamp Gmail sent files<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/04\/23\/spammers_slipping_spoofed_gmails_sent_folder\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Again, thanks to Google&#8217;s overly slick sharing features, the recipient would get a notification in their Gmail inbox that they had a shared photo waiting for them, and the spam itself would be delivered without being troubled by a filter. Additionally, Kaspersky&#8217;s team said Google Forms is being used to serve up fake surveys that harvest personal information, and Google Drive is being abused to host phishing pages, malware, and ad pages.<\/p>\n<p>Even Google Analytics is being turned into a tool for criminals. Vergelis said her team reported seeing businesses targeted with visitor statistics PDF files containing the spammer&#8217;s links or information. In short, pretty much any Google service that integrates with Gmail can and will be abused to get as much spam into your inbox as possible, and the same goes for other services like Facebook and Twitter that allow users to send each other event notifications.<\/p>\n<p>&#8220;The main problem is that messages sent through a legal service are assigned its standard headers, so spam filters often view them as harmless,&#8221; Vergelis explained. &#8220;And spam subjects vary widely, so interception requires a high threshold level in the spam filter, which can lead to excessive false positives. Spammers take advantage of this to exploit public services for their own purposes.&#8221;<\/p>\n<p>In response to Kaspersky&#8217;s findings, a Google spokesperson provided the Russian antivirus biz the following statement, which was shared with <em>El Reg<\/em>:<\/p>\n<p>&#8220;Google\u2019s Terms of Service and product policies prohibit the spreading of malicious content on our services, and we work diligently to prevent and proactively address abuse.<\/p>\n<p>&#8220;Combating spam is a never-ending battle, and while we&#8217;ve made great progress, sometimes spam gets through. We remain deeply committed to protecting all of our users from spam: we scan content on Photos for spam and provide users the ability to report spam in Calendar, Forms, Google Drive, and Google Photos, as well as block spammers from contacting them on Hangouts.<\/p>\n<p>&#8220;In addition, we offer security protections for users by warning them of known malicious URLs via Google Chrome&#8217;s Safe Browsing filters.&#8221; \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/06\/11\/google_kaspersky_gmail_spam\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky fingers pro-G filters for letting cyber-muck through Spammers are abusing the preferential treatment Google affords its own apps to score free passes through Gmail&#8217;s spam filters, it was claimed this week.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27163,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-27162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wondering where that upcoming meeting with &#039;Cheap Viagra&#039; came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics... 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wondering where that upcoming meeting with &#039;Cheap Viagra&#039; came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics... 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-11T23:54:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Wondering where that upcoming meeting with &#8216;Cheap Viagra&#8217; came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics&#8230;\",\"datePublished\":\"2019-06-11T23:54:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/\"},\"wordCount\":751,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/\",\"name\":\"Wondering where that upcoming meeting with 'Cheap Viagra' came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics... 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics.jpg\",\"datePublished\":\"2019-06-11T23:54:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wondering where that upcoming meeting with &#8216;Cheap Viagra&#8217; came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wondering where that upcoming meeting with 'Cheap Viagra' came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics... 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/","og_locale":"en_US","og_type":"article","og_title":"Wondering where that upcoming meeting with 'Cheap Viagra' came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics... 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-11T23:54:56+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Wondering where that upcoming meeting with &#8216;Cheap Viagra&#8217; came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics&#8230;","datePublished":"2019-06-11T23:54:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/"},"wordCount":751,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/","url":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/","name":"Wondering where that upcoming meeting with 'Cheap Viagra' came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics... 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics.jpg","datePublished":"2019-06-11T23:54:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/wondering-where-that-upcoming-meeting-with-cheap-viagra-came-from-spammers-beat-gmail-filters-by-abusing-google-calendar-forms-photos-analytics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Wondering where that upcoming meeting with &#8216;Cheap Viagra&#8217; came from? Spammers beat Gmail filters by abusing Google Calendar, Forms, Photos, Analytics&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27162"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27163"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}