What Is Happening
Meetup group organizers are being sent direct messages through Meetup's own messaging system. The messages claim that their event has been restricted and needs to be verified within 24 hours, and include a link to "restore full access."
The link is a trap. It does not go to Meetup. It leads to a page that asks for your bank and payment card details.
The most dangerous part: the notification email you receive really does come from Meetup. It passes every email security check. There is no way to tell from the email itself that anything is wrong.
The Message
Here is the exact message being sent, received on April 22, 2026. It arrived as a standard Meetup message notification from info@meetup.com:
Your event is temporarily inaccessible as your account still needs to be verified to complete the setup. During this time, certain features may be limited while the configuration process is being finalized. To proceed and restore full access, please use the link below:
https://meetup.com@tinyurl.com/meetup-user
After the verification is successfully completed, your account will be fully activated, all restrictions will be lifted, and your event will automatically return to public visibility without any further action required.
Sent by Ruth via Meetup messaging, April 22, 2026 at 4:05 PM
Meetup does not ask you to verify your account this way. Meetup does not ask for your bank details.
Why This Is So Convincing
Most phishing emails can be identified because they come from suspicious addresses or fail email security checks.
This one is different. We analysed the email headers and found:
- •DKIM pass: the email was cryptographically signed by meetup.com's mail servers
- •SPF pass: it was sent from an IP address that meetup.com has authorised
- •DMARC pass: meetup.com's own anti-fraud policy confirmed the email as legitimate
The reason is straightforward: the attacker created a Meetup account and sent you a real Meetup message. Meetup's notification system then delivered it to your inbox exactly as it would any other message. The email is genuinely from Meetup. The fraud happens at the link inside.
No spam filter will catch this. No email security tool will flag it. The warning signs are in the message content and the link, not the sender.
Why the Link Looks Like Meetup.com
The link in the message is:
https://meetup.com@tinyurl.com/meetup-user
At a glance it looks like a meetup.com address. It is not.
The @ symbol in a web address has a special meaning: anything before it is treated as a username, not a website. Your browser completely ignores the meetup.com part and connects to tinyurl.com instead, which then redirects you to the attacker's page.
This trick works because most people read a link left to right and stop when they see a name they recognise.
What Happens If You Click
The link passes through TinyURL and lands on a page at event.accepntshop.click, a domain that was registered the same day these messages were sent.
Step 1: Fake security check
You first see what looks like a Cloudflare security screen:

This is not a real security check. It is a delay screen that runs in the background to confirm a real person is visiting.
Step 2: Bank and card details form
After "passing" the check, you see this:
Account Verification
Your account is temporarily restricted. You need to verify your identity to remove all the restrictions. You need to confirm your bank details within 24 hours. Once the verification is completed all the restrictions will be removed and your account will be activated.
How will you verify: Visa · Mastercard · Amex · Discover · Maestro · PayPal · Apple Pay · Google Pay
🔒 All operations comply with PCI DSS
The PCI DSS badge and card logos are fake. Any details you enter here go directly to the attacker.
Who Is Being Targeted
This message is written for Meetup organizers specifically. The threat of an event going offline and taking your members with it is the exact fear designed to make you act without thinking.
The 24-hour deadline and the official-sounding language are both intentional pressure tactics.
What To Do
If you received this message:
- •Do not click the link
- •Report the message to Meetup: open the conversation, tap the three dots, and select "Report"
- •You can also report the sending account at help.meetup.com
If you already entered your details:
- •Call your bank immediately and report the card as compromised
- •Log into PayPal directly (not via any link) and change your password
- •Change your Meetup password
How to check a TinyURL link before clicking:
Add preview. to the front (preview.tinyurl.com/meetup-user) to see where it leads without visiting the page.
Report It
- •TinyURL abuse: phish.report/contacts/TinyURL
- •Meetup spam reporting: help.meetup.com
- •FBI Internet Crime Complaint Center: ic3.gov
Published April 22, 2026. The Cybersecurity Reach Foundation does not link to suspected malicious domains directly.
Stay Protected
Use our free tools to protect yourself from the threats discussed in this investigation.