Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

November 28, 2025

Threat Actors Exploit Calendar Subscriptions for Phishing and Malware

November 28, 2025

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

November 28, 2025
Facebook X (Twitter) Instagram
Friday, November 28
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Threat Actors Exploit Calendar Subscriptions for Phishing and Malware
News

Threat Actors Exploit Calendar Subscriptions for Phishing and Malware

Team-CWDBy Team-CWDNovember 28, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Threat actors have been found manipulating digital calendar subscription infrastructure to deliver harmful content.

Calendar series subscriptions allow third parties to add events and share notifications directly to devices. For instance, retailers sharing sale dates or sports associations updating calendar of sports matches.  

However, because these subscriptions allow a third-party server to add events directly, threat actors have been found setting up deceptive infrastructures to trick users into subscribing to notifications, according to new research by BitSight.

The malicious calendar subscriptions are often hosted on expired or hijacked domains, which can be exploited for large-scale social engineering.

Once a subscription is established, they can deliver calendar files that may contain harmful content, such as URLs or attachments.

The risks range from phishing and malware distribution to JavaScript execution and innovative attacks that exploit emerging technologies such as AI assistants.

Sinkhole Research Uncovers 347 Suspicious Calendar Domains

BitSight began its research with a single domain that was sinkholed, which recorded 11,000 unique IP addresses per day.

Sinkholing is a technique used in cybersecurity research to redirect malicious traffic away from its intended target to a controlled environment, the sinkhole.

This initial sinkhole related to a domain that functioned as a server a server for a subscribed calendar that distributed German public and school holiday events.

“That got our attention. Why would a domain for German holidays, with .ics files, be available?” the BitSight researchers wrote.

The investigation then expanded and uncovered an additional 347 domains (relating to FIFA 2018 events, Islamic Hijri calendar, etc.).

In total, these 347 domains were contacted by approximately four million unique IP addresses per day, with the highest geographic concentration in the US.

The BitSight team identified two types of sync requests in the sinkhole, strongly suggesting that these were not new subscriptions, but background sync requests from previously subscribed calendars.

“This means that anyone who took over or registered an expired domain would be able to respond with customized calendar .ics files and create additional events in these devices,” they wrote.

Calendar Subscriptions are an Overlooked Security Blind Spot

The cybersecurity firm noted that the research does not disclose a vulnerability in Google Calendar or iCalendar, the security risks arise from third-party calendar subscriptions.

While it noted that providers like Apple and Google have made significant strides in securing their ecosystems. However, BitSight said its findings highlight areas where emerging risks, like calendar-based abuse, may not yet be fully addressed, despite strong security postures elsewhere.

“Awareness and defenses of calendar subscriptions should be more robust, especially when compared to well-monitored and protected email solutions. The current imbalance creates a dangerous blind spot in both personal and corporate security postures,” the report concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Next Article ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
Team-CWD
  • Website

Related Posts

News

ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

November 28, 2025
News

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

November 28, 2025
News

Three Black Friday Scams to Watch Out For This Year

November 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.