express gazette logo
The Express Gazette
Tuesday, December 30, 2025

Fake Evite Invitations Used in New Phishing Campaign, Security Reporter Warns

Scammers are sending emotionally charged event invites that mimic Evite’s branding to trick recipients into clicking malicious links, cybersecurity observers say.

Technology & AI 3 months ago
Fake Evite Invitations Used in New Phishing Campaign, Security Reporter Warns

Scammers have begun using convincingly designed fake Evite invitations with emotionally charged subjects, such as “Special Celebration of Life,” to lure recipients into clicking links that can steal data or install malware, according to reporting by CyberGuy contributor Kurt “CyberGuy” Knutsson and Fox News.

In a documented instance, the email looked like a genuine Evite invitation and included familiar branding and a personalized touch. When the recipient clicked the “View Invitation” button, antivirus software blocked the destination and flagged the site as a phishing attempt. Security observers said one click on a malicious link can expose login credentials, personal information or allow malware to be installed on a device.

The campaign relies on social engineering techniques that reduce recipients’ skepticism by mimicking a familiar event service and invoking urgency or emotion. The phishers craft messages that appear to come from someone the target knows, and they use near-identical visual templates to legitimate Evite notices. In the reported example, a closer inspection of the hyperlink revealed a suspicious destination that did not match Evite’s official domain; the domain was misspelled as “envtte” rather than Evite.

The phishing emails can carry multiple risks. Besides credential theft and direct malware installation, links that lead to fraudulent pages can harvest personal details that enable further targeted attacks. Security professionals also note that fraudsters frequently use small alterations in sender addresses — an extra letter, a missing character or a different domain extension — to create the impression that a message is legitimate.

Another example of the fake Evite-style phishing message

Cybersecurity guidance included several practical steps to reduce risk. Use reputable antivirus or endpoint protection software with phishing detection and automatic blocking to prevent access to known malicious sites. Carefully check the sender’s full email address rather than relying only on the displayed name. Hovering over links before clicking will typically reveal the real destination URL in most email clients and browsers; if the address looks unfamiliar or contains unusual spellings, do not follow the link.

Security advisors also recommend limiting the amount of personal information available to fraudsters by using personal data removal services that scrub contact details from public databases. That reduces attackers’ ability to craft highly personalized invitations. When an invitation appears to come from a friend or family member, recipients are advised to verify the message through a separate communication channel, such as a text or a phone call, before clicking any embedded links.

Phishing warning shown after clicking a fraudulent invitation link

The Evite-style campaign is one of several recent phishing efforts that exploit trust and urgency. Fox News reporting also notes attacks that target retirees by impersonating government agencies such as the Social Security Administration. Cybersecurity professionals say these trends underscore the need for basic digital hygiene: up-to-date security software, cautious handling of unexpected messages and verification of senders.

Knutsson said he was fortunate that antivirus software blocked the malicious site before any damage occurred. Security specialists cautioned that not all recipients have such protections enabled, and that even convincing, personal-looking invitations can be traps. Technology users are urged to take an extra moment to verify invitations, check links and confirm senders to avoid becoming victims of evolving phishing schemes.

The reporting and examples were provided by Kurt “CyberGuy” Knutsson for Fox News and CyberGuy.com.


Sources