You have 0 free articles left this month.
Register for a free account to access unlimited free content.
Powered by MOMENTUM MEDIA
lawyers weekly logo

Powered by MOMENTUMMEDIA

For breaking news and daily updates, subscribe to our newsletter.
Advertisement

From calendar to compromise: How hackers exploit the iCalendar format

It might look like a simple calendar invite, but these innocuous text files can hide a multitude of threats – here’s how.

From calendar to compromise: How hackers exploit the iCalendar format
expand image

Calendar invites are one of the most common things we see in our email inboxes. They’re from colleagues for meeting requests, invites from clients or partners to attend an event, or even just a reminder that an office pub lunch is coming up.

But as common as they are, they are sadly far from innocent, and hackers are increasingly turning to the popular iCalendar invite format to deploy all manner of malware or engage in phishing campaigns.

The issue, according to a new blog post from Rapid7, is the simplicity of the .ics format. This text-based format is designed to work seamlessly across Outlook, Google Calendar, and Apple platforms – and many more besides.

 
 

“Each invite contains a structured list of fields like SUMMARY, LOCATION, DESCRIPTION, and ATTACH. Within these, attackers have found an opportunity: they can embed URLs, malicious redirects, or even base64-encoded content,” Rapid7 Labs said.

“The result is a file that appears completely legitimate to a calendar client, yet quietly delivers the attacker’s message, link, or payload.”

These plain text files can easily slip past the usual security controls, and .ics files aren’t treated as seriously as some other file formats. In addition, their ubiquity makes them oddly trusted – we all get them, all the time.

The .ics attack chain

Many attackers abusing this technique often rely upon layers of social engineering techniques. They use a professional-looking name and other details, often spoofed from a legitimate organisation, and can rely upon creating a sense of urgency, with calls to action such as “Your access expires in 15 minutes – join now”.

The automation of the format also helps, with external invites automatically added to a user’s daily schedule.

Links inside the LOCATION or DESCRIPTION fields are also easily manipulated to point to document-sharing sites or fake login pages.

“The real danger of malicious calendar invites isn’t just the link inside, it’s the automatic delivery mechanism. In certain configurations, Outlook and Google Calendar will automatically process .ics attachments and create tentative events, even if the user never opens or even receives the email,” Rapid7 said.

“That means the malicious link is now part of the user’s trusted interface with their calendar.”

Even if the initial email might look suspicious, the calendar reminder that pops up later will seem like just a part of the daily work schedule. As Rapid7 said, “It’s phishing that moves in quietly and waits.”

What can you do?

Attacks that abuse the .ics format are becoming more common, so here are some practical steps that can keep the hackers at bay:

  • .ics files should be treated like any other active content. Email filters and attachment scanners should be set up to inspect calendar files for URLs, base64-encoded data, or ATTACH fields.
  • Regularly review calendar client defaults. Automatic addition of external events should be disabled wherever possible. Flag external organisers with clear warnings.
  • Use content disarm and reconstruction (CDR) tools to strip out or neutralise dangerous links embedded in calendar fields.
  • Undertake employee training regarding how to handle unexpected invites – especially those urging immediate action or containing unexpected meeting links. This Google Support article is a particularly good starting point for most employees.
  • Always require multifactor authentication and take advantage of conditional access policies to mitigate the impact if a phishing link does manage to steal credentials.

“The next time an unexpected meeting appears in your calendar, it might be more than just a double-booking,” Rapid7 said.

“It could be a reminder that security isn’t only about blocking malware, but about questioning what we assume to be safe.”

David Hollingworth

David Hollingworth

David Hollingworth has been writing about technology for over 20 years, and has worked for a range of print and online titles in his career. He is enjoying getting to grips with cyber security, especially when it lets him talk about Lego.

Tags:
You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.