Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Chinese APT41 exploits Google Calendar for teammates and management programs
Global Security

Chinese APT41 exploits Google Calendar for teammates and management programs

AdminBy AdminMay 29, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 29, 2025Red LakshmananMalicious software / cloud security

Google on Wednesday revealed that a Chinese actor funded by a state known as APT41 used malicious software called ThuPPRogress, which uses Google Calendar for command and control (C2).

The technological giant, which revealed the activity in late October 2024, said that malicious software was carried out on the website of the compromised government and was used to orient for several other state organizations.

“Incorrect use of cloud services for C2 is a technique that many threats are used to combine with legitimate activity,” – Google Group Group (Gtig) Researcher Patrick Whitel – Note.

APT41, also tracked in the form of axioms, black, tiphun (formerly Bari), bronze atlas, side, sick, red kelp, ta415, wicked Panda and Winnti, the name intended for the prolific group of a national state known for its targeting of governments and organizations. and entertainment, technology and automatic sectors.

Cybersecurity

In July 2024. Google disclosed What several organizations operating in these industry verticals in Italy, Spain, Taiwan, Thailand, Turkey and the UK were aimed at a “sustainable company” using a combination of web and people such as AntSWord, Bluebeam, DustPan and Dustrap.

Then earlier this year was a subclass at the APT41 umbrella definite As a result of the attack on Japanese companies in the production, materials and energy sectors in March 2024 as part of the Revivalstone campaign.

The latest attack chain recorded by Google provides for sending emails containing a link to the ZIP archive, which is located on the operated government site. The Zip -Fale contains a directory and a Windows label (LNK), which is masked as a PDF document. The catalog presents seven different arthropod images (from “1.jpg” to “7.jpg”).

The infection begins at the launch of the LNK file, causing the PDF to be represented by the recipient, which states that the species extended from the directory must be announced for export. However, it should be noted that “6.jpg” and “7.jpg” are fake images.

“The first file is actually an encrypted useful load and deciphered by the second file, which is a DLL file, running when the target clicks on LNK,” said Waitl, adding malicious programs, implementing various methods of stelles and evading, such as useful loads, epiphosus.

The malicious software consists of three different components, each of which is deployed in the series and designed to perform a specific feature –

  • Plusdrop, Dll, used to decrypt and perform the next stage in memory
  • Plusinject that is running and performing The process is to allocate On the legal process of “svchost.exe” for the introduction of the final useful load
  • HOLDPROGRESS, MAIN MOSSIBLE SOFT SOFT SOFT SOLDS FOR GOOGE CELENDAR FOR C2

Malicious software is designed to read and recording activities with a controlled Google Calendar attacker, creating a zero minute on a solid date (2023-05-30) to save the collected data in description of the event.

The operators encountered the teams in the calendar events on July 30 and 31, 2023, which were then interviewed by malware, deciphered on the compromised Windows hoste, and the results written back to another calendar event from which they can be obtained by the attackers.

Cybersecurity

Google said he took the step of removing the malicious Google calendar and stopped related work space projects, thereby neutralizing the entire company. It also states that the affected organizations were notified. The exact scale of the company is unclear.

This is not the first time APT41 has armed Google’s services to its advantage. In April 2023 Google disclosed The fact that the actor threatens is aimed at the unnamed Taiwanese Organization to deliver the Red Comening tool with the open source Go, known as Command and Control Google (GC2), put through passwords protected on Google Drive.

After installing the GC2, it acts as a back to read commands with Google Sheets and Exfiltrate data using the Cloud Storage service.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.