Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks

Posted on November 27, 2025November 27, 2025 By CWS

Digital calendars have grow to be indispensable instruments for managing private {and professional} schedules. Customers regularly subscribe to exterior calendars for public holidays, sports activities schedules, or neighborhood occasions to maintain their agendas updated.

Whereas these subscriptions provide comfort, they create a persistent connection between a consumer’s machine and an exterior server.

If the area internet hosting the calendar is deserted and subsequently expires, it opens a harmful vulnerability.

Cybercriminals can re-register these expired domains, successfully hijacking the belief established by the unique subscription.

The assault vector is especially insidious as a result of it requires no new motion from the sufferer. The consumer’s machine continues to carry out background synchronization requests to the now-malicious area.

Attackers can then push various threats straight into the calendar interface, starting from scareware that mimics system safety alerts to phishing hyperlinks disguised as unique presents.

This technique bypasses conventional electronic mail filters, leveraging the implicit belief customers place of their private planning instruments to ship malicious payloads.

Bitsight safety analysts recognized this rising menace panorama after investigating a single suspicious area distributing vacation occasions.

Their deep dive revealed a sprawling community of over 390 deserted domains that had been actively receiving synchronization requests.

Additional evaluation indicated that these domains had been speaking with roughly 4 million distinctive IP addresses day by day, primarily from iOS and macOS units.

An infection and redirection chain (Supply – Bitsight)

This huge scale highlights how a easy lapsed area registration can expose tens of millions of customers to potential compromise with out their information.

Technical Breakdown of the Synchronization Site visitors

The investigation uncovered particular technical patterns that facilitate this exploitation. The site visitors is characterised by HTTP requests the place the Settle for header indicators the machine’s readiness to parse calendar recordsdata.

Operational overview and potential dangers (Supply – Bitsight)

The Consumer-Agent string, usually containing the daemon identifier, explicitly identifies the supply because the iOS Calendar system, confirming the request is a background course of somewhat than a user-initiated browser go to.

GET /[URI]Host: [Target_Domain]Consumer-Agent: iOS/17.5.1 (21F90) dataaccessd/1.0Accept: textual content/calendar

Researchers categorized the malicious site visitors into two primary varieties: Base64-encoded URIs and Webcal question requests.

Calendar .ics file returned by lively area (Supply – Bitsight)

As seen within the above determine that the Calendar .ics file returned by lively area, the server responds with an iCalendar file that may include manipulated occasion knowledge.

Moreover, the underlying infrastructure typically employs closely obfuscated JavaScript to execute deeper compromises.

The code snippet beneath demonstrates how a payload is dynamically injected into the web page’s Doc Object Mannequin to provoke a redirection chain:-

_0x407c32.src = ” (doc.currentScript) {doc.currentScript.parentNode.insertBefore(_0x407c32, doc.currentScript);}

This script, as soon as deobfuscated, reveals the mechanism used to load additional malicious content material, typically main customers to the scams.

By understanding these distinct site visitors signatures and script behaviors, safety professionals can higher establish and block this covert assault vector.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Abandoned, Devices, Domains, Expose, iCalendar, Million, Risks, Security, Sync

Post navigation

Previous Post: Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

Related Posts

New Text Message Based Phishing Attack from China Targeting Users Around the Globe Cyber Security News
Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams Cyber Security News
Women’s Dating App Tea Exposes Selfie Images of 13,000 Users Cyber Security News
Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image Cyber Security News
Hackers Accessed Customer Data From Salesforce Cyber Security News
Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0
  • Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0
  • Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark