Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments

Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments

Posted on May 30, 2025May 30, 2025 By CWS

Chinese language state-sponsored menace actor APT41 has focused authorities entities with malware that makes use of Google Calendar for command-and-control (C&C), Google warns.

Additionally tracked as Barium, Winnti, Depraved Panda and Depraved Spider, APT41 is understood for concentrating on organizations globally, throughout a number of sectors, together with automotive, leisure, authorities, logistics, media, delivery, and expertise sectors.

In assaults noticed in October 2024, the menace actor used a compromised authorities website to focus on different authorities entities with the ToughProgress malware that makes use of an attacker-controlled Google Calendar for C&C.

APT41 relied on phishing emails containing a hyperlink to a ZIP archive hosted on the compromised web site, which contained a LNK file posing as a PDF doc.

When opened, the LNK file launched a DLL (dubbed PlusDrop) that executed the following stage (PlusInject) designed to inject the ultimate payload (ToughProgress) into the reliable svchost course of, utilizing the method hollowing method.

Upon execution, ToughProgress would create a zero-minute Calendar occasion at a hardcoded date writing to the occasion description information collected from the compromised machine, encrypted. The malware may learn hardcoded Calendar occasions, to which the operator writes instructions.

“When an occasion is retrieved, the occasion description is decrypted and the command it incorporates is executed on the compromised host. Outcomes from the command execution are encrypted and written again to a different Calendar occasion,” Google explains.

The web large says it developed customized fingerprints it used to seek out and take down APT41-controlled Calendars, and recognized and disrupted the group’s Workspace initiatives, to disrupt its infrastructure.Commercial. Scroll to proceed studying.

Google additionally added detections to the Google Secure Looking blocklist, notified the affected organizations, and offered them with a pattern of the ToughProgress community visitors logs to assist with their detection and remediation efforts.

Moreover, Google warned that since August 2024, APT41 was seen utilizing free website hosting instruments for the distribution of malware similar to Voldemort, DustTrap, ToughProgress, and others. Tons of of entities have been served hyperlinks to those internet hosting websites.

Associated: Chinese language Hacking Group APT41 Infiltrates World Delivery and Tech Sectors

Associated: Chinese language Hacking Group ‘Earth Lamia’ Targets A number of Industries

Associated:SentinelOne Focused by North Korean IT Staff, Ransomware Teams, Chinese language Hackers

Security Week News Tags:APT41, Calendar, Chinese, Exploits, Google, Governments, Group, Hacking, Target

Post navigation

Previous Post: MITRE Publishes Post-Quantum Cryptography Migration Roadmap
Next Post: China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

Related Posts

Google Patches Mysterious Chrome Zero-Day Exploited in the Wild Google Patches Mysterious Chrome Zero-Day Exploited in the Wild Security Week News
Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site Security Week News
Orca Snaps Up Opus in Cloud Security Automation Push Orca Snaps Up Opus in Cloud Security Automation Push Security Week News
In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias Security Week News
In Other News: 0k for XSS Bugs, HybridPetya Malware, Burger King Censors Research In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research Security Week News
OpenAI Expands AI Security with Promptfoo Acquisition OpenAI Expands AI Security with Promptfoo Acquisition Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark