Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Take: Who will become Poland’s next president? |Election News

Meta destroys the influence of the OPS targeting Romania, Azerbaijan and Taiwan.

Climate activist Greta Samberg joins aid ship efforts to break the siege of Gaza | Israeli-Palestinian conflict news

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » China’s APT41 misuses Google Calendar for malware command and control operations
Identity

China’s APT41 misuses Google Calendar for malware command and control operations

userBy userMay 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 29, 2025Ravi LakshmananMalware/Cloud Security

Google announced on Wednesday that a Chinese-sponsored threat actor known as APT41 has leveraged a malware called ToughProgress, which uses Google Calendar for command and control (C2).

The tech giant, which discovered the activity in late October 2024, said the malware was hosted on a government website where it compromised and used to target several other government agencies.

“The misuse of C2 cloud services is a technique that many threat actors use to integrate with legitimate activities,” said Patrick Whitsell, a researcher at Google Threat Intelligence Group (GTIG).

APT41 is also tracked as Axiom, Blackfly, Brass Typhoon (formerly Barium), Bronze Atlas, Earthbac, Hoodoo, Red Kelpie, TA415, Evil Panda, and Winnty.

Cybersecurity

In July 2024, Google revealed that several entities operating in these industries, including Italy, Spain, Taiwan, Thailand, Turkey and the UK, are targeting “sustainable campaigns” using a combination of webshells and droppers, such as Antward, Blue Beam, Dust Pan and Dust Trap.

Then earlier this year, a subcluster within the APT41 umbrella was identified in March 2024 as attacking Japanese companies in the manufacturing, materials and energy sectors as part of a campaign called Revival Stone.

The latest attack chain documented by Google involves sending a spear phishing email containing a link to a ZIP archive hosted on the Exploided Government website. The ZIP file contains a directory that disguises itself as a PDF document and a Windows Shortcut (LNK). The directory features seven different images of arthropods (from “1.JPG” to “7.JPG”).

The infection begins when the LNK file is launched and presents the recipient with a decoy PDF that states that the species extracted from the directory must be declared for export. However, it is worth noting that “6.jpg” and “7.jpg” are fake images.

“The first file is actually an encrypted payload and is decrypted by the second file. This is a DLL file launched when the target clicks on LNK. Malware implements a variety of stealth and avoidance techniques, including memory-only payloads, encryption, compression, and control flow esoteric.

The malware consists of three different components, each deployed in series and designed to execute a specific function –

Plus Drop, DLL is used to decrypt and perform the next stage of Memory Plus Ingation.

The malware is designed to read and write events using an attacker-controlled Google Calendar, creating zero mite events on hardcoded dates (2023-05-30) to store harvested data in event descriptions.

The operator places encrypted commands in the calendar event on July 30th and 31st, 2023, then voted by the malware, decrypted, and executed on a compromised Windows host, with the results written back to another calendar event that the attacker can extract.

Cybersecurity

Google said it took steps to remove malicious Google Calendar and ended the associated workspace project, thereby neutralizing the entire campaign. He also said that affected organizations have been notified. The exact scale of the campaign is unknown.

This is not the first time that APT41 has weaponized Google’s services in its favor. In April 2023, Google revealed that threat actors will target unknown Taiwanese media organizations and provide a GO-based open source red teaming tool known as Google Command and Control (GC2) that is delivered via password-protected files hosted on Google Drive.

Once installed, GC2 acts as a backdoor to read commands from Google Sheets and remove data using cloud storage services.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCambodia PM gently urges border conflict with Thailand after soldiers die | Border Dispute News
Next Article Acclaimed Kenyan author and dissident Ngugi Wa Thiong’o dies at 87 | Obituary News
user
  • Website

Related Posts

Meta destroys the influence of the OPS targeting Romania, Azerbaijan and Taiwan.

May 30, 2025

Cybercriminals target AI users using malware load installers that pretend to be popular tools

May 29, 2025

New Windows Rats Avoid detection for weeks using corrupted DOS and PE headers

May 29, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Take: Who will become Poland’s next president? |Election News

Meta destroys the influence of the OPS targeting Romania, Azerbaijan and Taiwan.

Climate activist Greta Samberg joins aid ship efforts to break the siege of Gaza | Israeli-Palestinian conflict news

Faizan Zaki wins Scripps National Spelling Bee

Trending Posts

Take: Who will become Poland’s next president? |Election News

May 30, 2025

Climate activist Greta Samberg joins aid ship efforts to break the siege of Gaza | Israeli-Palestinian conflict news

May 30, 2025

Federal Court of Appeals temporarily recovers Trump’s tariffs International Trade News

May 29, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startup and Tech Funding News – May 28, 2025

Grammarly raises $1 billion from popular catalysts, expands its AI platform and accelerates growth towards IPOs

The exchange raises $2.1 million to accelerate clean energy projects with AI-powered site intelligence

Donut Lab raises $7 million pre-seed round to launch its first “agent” crypto browser

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.