• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

Calendar’s File .ics phishing attack technique

AnonyViet by AnonyViet
January 24, 2023
in Security
0

.ics is the extension of the calendar file, when opening this file it will integrate the calendars, calendar notes into the device. If Currently many Hackers take advantage of .ics to attack phishing. Recently while checking out Google Calendar, I noticed that .ics files can be abused in a way that they have never been used before. This technique allows you to create meetings on Calendar with fake organizers and attendees.

Join the channel Telegram of the AnonyViet 👉 Link 👈

Fake Calendar invite with .ics . file

Isc . file compatibility

I discovered that this technique will work on all the most popular email service providers (e.g. Google Workspace, O365), if opened on Android or iOS it will integrate into the phone’s Calendar. But it works better on Google targets due to the way Google displays .ics attachments. Therefore, the illustration below will only target Google.

Attack Procedure

Can understand the process of attacking with ics file like this, Hacker will trick you to open the ics file, and then scheduled content such as meetings, notes will be integrated into the Calendar on your device, When the date/month is scheduled it will show a notification and when you open the notification it will redirect to a malicious Web page or download malicious code to your computer.

Download the .ics template

The easiest way to download an .ics file is to create a Google Calendar invite from one Gmail account to another and then download the email attachment. invite.ics.

Calendar 10's File .ics phishing attack technique

Sign in to the other email, click on the email invitation, and download the invite.ics file.

Calendar 11's File .ics phishing attack technique

Calendar 12's File .ics phishing attack technique

Calendar 13 . File .ics phishing attack technique

Now we have the .ics file to fake it.

Fake

Open the invite.ics file with a text editor. You will see each line in key: value format. Remove the line starting with the UID.

# Xóa dòng này
UID:[email protected]

Now you can start spoofing contacts. The organizer can be tampered with by modifying the value CN= as below.

ORGANIZER;[email protected]:mailto:[email protected]

For attendees, you can add as many as you like and modify the value again CN= and that’s the email the user will see.

ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=TRUE;[email protected];X-NUM-GUESTS=0:mailto:[email protected]

Force attendees to accept the invitation

All attendees have a PARTSTAT= key. Just set it to PARTSTAT=ACCEPTED, and it will appear as if attendees have accepted the invitation.

Add profile photo

The attendee’s mailto: address can be another email you own or a random email. The perk of using an email you own is that you can log into that account and upload the profile picture of the person you want to impersonate.

For example, if one of the attendees has [email protected] and mailto:[email protected]. I can upload Johnathan’s photo to [email protected] and that’s what the user will see in the invitation.

Important Note

Make sure the organizer’s mailto: address is a non-Google email (not Gmail or Google Workspace). For some reason if it is a Google email, the “Yes/Maybe/No” buttons are not included in the email. For this example, I will use a Hotmail account.

Calendar title and time

You can change the calendar title by modifying the Summary: key in the .ics file.

You can modify the time with DTSTART: and DTEND:.

Process Summary

I’ll summarize the steps in case you can’t figure it out. I’m assuming I’ve downloaded the invite.ics file.

Step 1

Remove the line starting with the UID in the .ics file.

Step 2

Fool the organizers and attendees by modifying the CN= and mailto: values. Make sure the organizer’s mailto: value is a non-Google email. Also make sure you set PARTSTAT = ACCEPTED for all attendees except the victim.

ORGANIZER;[email protected]:mailto:[email protected]
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=NEEDS-ACTION;RSVP=
TRUE;[email protected];X-NUM-GUESTS=0:mailto:[email protected]
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=ACCEPTED;RSVP=
TRUE;[email protected];X-NUM-GUESTS=0:mailto:[email protected]
ATTENDEE;CUTYPE=INDIVIDUAL;ROLE=REQ-PARTICIPANT;PARTSTAT=ACCEPTED;RSVP=
TRUE;[email protected];X-NUM-GUESTS=0:mailto:[email protected]

Step 3

Modify the Calendar title to whatever name you want.

SUMMARY:Mandatory Company Townhall Meeting

Step 4

Make sure you have set the time of the invite schedule correctly. The times shown below are 2021-11-02 12 noon – 1pm.

DTSTART:20211102T160000Z
DTEND:20211102T170000Z

Step 5

Compose an email to the victim and attach the .ics file. The email header format should be as follows:

Invitation: CALENDAR-TITLE-HERE @ Wed Nov 2, 2021 12pm - 1pm (EDT) ([email protected])

Step 6 – Options

Add the Google Meet link to the email body because Google splits the Google Meet link in the .ics file.

Calendar 14 . File .ics phishing attack technique

Result

As expected, users see the fake names you have recorded.

Calendar 15 . File .ics phishing attack technique

And both fake users accepted the meeting.

Calendar 16 . File .ics phishing attack technique

By hovering over the names on Google Calendar, mailto:email will appear, so try to set it to an address that closely resembles the fake email.

Example: [email protected] and mailto: [email protected]

Calendar 17's File .ics phishing attack technique

Alternatively, you can also create meeting notes using Google Calendar here.

The article achieved: 5/5 – (100 votes)

Tags: .icsAttackCalendarsfilePhishingtechnique
Previous Post

3 Ways to enter Medium.com without the latest IP blocking

Next Post

Lesson 115: Or condition in Excel

AnonyViet

AnonyViet

Related Posts

How to use hackers use Splitfus to execute PowerShell malicious code
Security

How to use hackers use Splitfus to execute PowerShell malicious code

July 20, 2025
How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Next Post
Lesson 115: Or condition in Excel

Lesson 115: Or condition in Excel

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Instructions on how to format text on the Windows 11 notepad

Instructions on how to format text on the Windows 11 notepad

August 16, 2025
Instructions for receiving 80GB of free data from VinaPhone from August 15

Instructions for receiving 80GB of free data from VinaPhone from August 15

August 15, 2025
Online driving exam preparation: Support theory and practice

Online driving exam preparation: Support theory and practice

August 15, 2025
How to add application to your favorite bar

How to add application to your favorite bar

August 14, 2025
Instructions on how to format text on the Windows 11 notepad

Instructions on how to format text on the Windows 11 notepad

August 16, 2025
Instructions for receiving 80GB of free data from VinaPhone from August 15

Instructions for receiving 80GB of free data from VinaPhone from August 15

August 15, 2025
Online driving exam preparation: Support theory and practice

Online driving exam preparation: Support theory and practice

August 15, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Instructions on how to format text on the Windows 11 notepad

Instructions on how to format text on the Windows 11 notepad

August 16, 2025
Instructions for receiving 80GB of free data from VinaPhone from August 15

Instructions for receiving 80GB of free data from VinaPhone from August 15

August 15, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí mm88 8XBET mm88 trang chủ new88

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí mm88 8XBET mm88 trang chủ new88

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply