Phishing with Calendars (.ICS Files)
Theory
We can leverage calendar invites as an initial access vector, using the iCalendar (ICS) file format to create a phishing scenario.
The ICS File format is used on several Calendars like Google Calendar, Outlook, and Apple Calendar.
Practice
.ICS Format File Overview
The easiest way to get a .ics file is by creating a Google Calendar invite from one Gmail account to another and then downloading the invite.ics email attachment.
An example of an Exchange .ICS file can be found below:
Interesting fields can be found below
UID
UID Should be uniq and regenerated each times
ORGANIZER
The organizer can be spoofed by modifying the CN=
value
ATTENDEE
You can add as many attendee as you’d like
PARTSTAT
We can force Attendees To Accept The Invite by setting PARTSTAT=ACCEPTED
DTSTART / DTEND
This properties specify the start and end times of the event
DESCRIPTION
It provides additional details about the event, and can be used to insert malicious contents / links.
Phishing Attack
Fakemeeting can be used to automate the process of creating .ICS
phishing files. These invites can include a phishing URL, inside the DESCRIPTION field, crafted with a convincing pretext, encouraging the target to download a file or enter their credentials.
Resources
Last updated
Was this helpful?