CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Threat Actors Exploit Calendar Subscriptions for Phishing and Malware Delivery

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Threat actors are manipulating digital calendar subscription infrastructure to deliver phishing and malware. They exploit expired or hijacked domains to set up deceptive infrastructures, tricking users into subscribing to malicious notifications. Once subscribed, attackers can deliver harmful content, including URLs or attachments, leading to phishing, malware distribution, and even JavaScript execution. BitSight's research uncovered 347 suspicious calendar domains, with approximately four million unique IP addresses per day interacting with these domains, primarily in the US.

Timeline

  1. 28.11.2025 17:05 1 articles · 23h ago

    BitSight Research Uncovers 347 Suspicious Calendar Domains

    BitSight's research began with a single sinkholed domain related to German public and school holiday events, which recorded 11,000 unique IP addresses per day. The investigation expanded to uncover 347 additional suspicious calendar domains, with approximately four million unique IP addresses interacting with them daily. The highest geographic concentration of interactions was in the US. The research identified two types of sync requests, suggesting that these were background sync requests from previously subscribed calendars, allowing attackers to deliver customized malicious calendar .ics files.

    Show sources

Information Snippets