Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Threat Actors Exploit Calendar Subscriptions to Distribute Phishing Links and Malware
Advertisements

Cybersecurity researchers at Kaspersky have identified an active campaign where threat actors are exploiting calendar subscriptions to deliver phishing links and malware. The attack leverages malicious ICS files, a standard format for calendar events, which are sent to victims via email.

The social engineering tactics employed in these emails often involve fake notifications about package deliveries or unpaid invoices. These messages prompt the recipient to open and accept the attached ICS calendar invitation. Once the user accepts the event, it is automatically added to their calendar application.

Attack Vector and Delivery Mechanism

The core of the attack lies within the description field of the calendar event. Threat actors embed malicious links into this section, which become active notifications on the user’s device once the event is added to their calendar. This technique is designed to bypass standard email security filters by using a trusted application, the calendar, to present the malicious content.

Kaspersky’s analysis revealed two primary attack vectors stemming from this method. The first involves phishing, where the embedded links redirect users to fraudulent websites. These sites are designed to harvest credentials by tricking users into entering their login information. The second vector is direct malware delivery. In these instances, clicking the link in the calendar event initiates the download of malicious software onto the user’s system.

Observed Malware Payloads

The campaign has been observed distributing information-stealing malware. Specifically, researchers have identified the delivery of Lumma and Rhadamanthys stealers. These types of malware are designed to exfiltrate sensitive information from an infected device, such as passwords, financial details, and other personal data. To obscure the final malicious destination, the attackers utilize URL shorteners and a series of redirects, making it more difficult for security tools to detect the threat.