ICS phishing (phishing with malicious calendar invites) gives adversaries two payload delivery methods in one attack: your inbox and your calendar. Sublime shuts both of them down at once.
The explosion and sophistication of AI-generated email attacks requires a solution that provides best-in-class efficacy, but also the ability to contextualize and respond to threats in real time. With Sublime, our team can prevent, detect, and respond to email-borne threats of today and the future.

ICS phishing is an attack that delivers malicious payloads within calendar invitations (.ics files).
These attacks take advantage of the fact that meetings are often automatically added to a calendar when an invitation is received. Email clients often auto-add the message body and attachments to the calendar event, so malicious payloads exist in both the calendar and inbox.
Calendar invites can bypass mail processing entirely, whether you have a SEG or API-based email security solution, so special handling is required to remediate the attack from the calendar.
ICS phishing puts a payload in your calendar – a place most email security solutions can’t reach.
Calendar applications and events are separate from email message processing, creating potential gaps in coverage.
An invite popping up on a calendar schedule doesn't trigger the same skepticism as a link in an email.
When an email is deleted, the meeting that delivered it remains on the target’s calendar.
Sublime uses a layered combination of AI, machine learning, and org-specific detections to catch these attacks.
When Sublime sends a message to quarantine, spam, or trash, it will also delete corresponding events from the calendar automatically – no additional steps required.

Sublime analyzes attachments, including meeting invitations, for suspicious indicators. This includes recursive analysis of archives, scanning all the files within, regardless of depth.

Sublime uses a browser emulation sandbox and machine learning to follow links and QR codes within messages and attachments through redirects to resolve the effective URL and collect a screenshot for further analysis.

Sublime analyzes messages and attachments with computer vision and Natural Language Understanding to detect brand impersonation, a common evasion tactic for ICS attacks.

Infrastructure metadata like free meeting platforms, free file hosts, free email providers, known-malicious domains, failed authentication, and more expose even the most well-crafted ICS phishing attack.
See how Sublime's comprehensive phishing protection service can safeguard your organization from sophisticated ICS phishing attacks.
The latest news, research, and attack spotlights about phishing and phishing protection service solutions.
See how Sublime delivers autonomous protection by default, with control on demand.