iCloud Calendar Invites Abused to Send Callback Phishing Emails via Apple Servers

by | Sep 8, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Abuse of iCloud Calendar Invites

Threat actors are leveraging Apple’s iCloud Calendar invite system to deliver phishing emails disguised as PayPal purchase notifications, making the messages appear more legitimate and allowing them to bypass traditional spam filters.

Earlier this month, a reader shared an example with BleepingComputer. The phishing email claimed the recipient had been billed $599 through PayPal, urging them to call a “support” number to dispute or cancel the charge.

iCloud Calendar invites used for phishing emailsiCloud Calendar invites used for phishing emails
Source: BleepingComputer


Classic Callback Phishing Tactics

This campaign follows the typical callback phishing playbook:

  • Victims are scared into believing an unauthorized payment was processed.
  • They are urged to call a fake support line.
  • Once on the phone, scammers attempt to persuade targets to install remote access tools.

Historically, such scams have been used not to issue refunds but to steal bank funds, deploy malware, or exfiltrate sensitive data.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses



Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Why Apple Servers Are Involved

What makes this campaign unusual is that the phishing messages were sent from [email protected], fully authenticated by Apple’s infrastructure.

Email headers showed:

Authentication-Results: spf=pass (sender IP is 17.23.6.69)
 smtp.mailfrom=email.apple.com; dkim=pass (signature was verified)
 header.d=email.apple.com; dmarc=pass action=none header.from=email.apple.com;

This was achieved by embedding the phishing lure in the Notes field of an iCloud Calendar invite. When external recipients are added to an iCloud Calendar event, Apple’s servers automatically send an email invitation on behalf of the calendar owner — in this case, carrying the scam text.

The targeted address, a Microsoft 365 email account, acted as a forwarding mailing list, distributing the phishing email to multiple recipients.


Role of Microsoft’s SRS

Normally, forwarded emails break SPF checks. However, Microsoft 365’s Sender Rewriting Scheme (SRS) rewrites the return path so that forwarded emails can still pass authentication.

This allowed the phishing message to retain its legitimacy, appearing to come directly from Apple’s trusted infrastructure even after being distributed through Microsoft’s system.

 




Impact and Risks

While the lure itself — a fake PayPal receipt — is common, the use of Apple’s servers and branding significantly increases the chance of victims falling for the scam.

Because these emails pass all authentication checks, they are more likely to evade spam filters and reach inboxes.

Security experts caution that unexpected calendar invites containing unusual text should always be treated as suspicious.

BleepingComputer reached out to Apple for comment regarding the abuse of its iCloud Calendar infrastructure. At the time of publication, no response had been received.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This