Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT41 Hackers Using Google Calendar for Malware Command-and-Control To Attack Government Entities

APT41 Hackers Using Google Calendar for Malware Command-and-Control To Attack Government Entities

Posted on June 9, 2025June 10, 2025 By CWS

A current marketing campaign by Chinese language state-sponsored menace actor APT41 has unveiled a novel exploitation of Google Calendar for malware command-and-control (C2) operations, marking a big escalation in cyberespionage ways.

The group, tracked underneath aliases together with BARIUM and Brass Storm, focused Taiwanese authorities entities by way of a multi-stage assault chain combining spearphishing, image-based payload supply, and covert C2 through broadly trusted cloud providers.

The marketing campaign throughout forensic evaluation of a compromised authorities web site, revealing a complicated workflow designed to evade conventional detection mechanisms.

The assault begins with spearphishing emails distributing ZIP archives labeled “出境海關申報清單.zip” (“Export Customs Declaration Listing.zip”).

Resecurity researchers recognized that inside, the victims encounter a shortcut LNK file masquerading as a PDF (“申報物品清單.pdf.lnk”) and a picture folder containing seven information.

Whereas information 1–5 show legit arthropod specimens, 6.jpg and seven.jpg harbor encrypted malware elements. When executed, the LNK file shows a decoy PDF about export rules whereas silently deploying APT41’s ToughProgress malware suite.

Encrypted malware elements (Supply – Resecurity)

This three-module framework—PLUSDROP, PLUSINJECT, and TOUGHPROGRESS—combines memory-resident execution, course of hollowing, and cloud-based C2 to take care of persistence.

Resecurity analysts famous the marketing campaign’s innovation lies in its abuse of Google Calendar occasions for bidirectional communication. In contrast to conventional C2 servers, this method blends malicious site visitors with legit Google Workspace API requests, complicating network-based detection.

Rundll32.exe makes an attempt to decrypt 6.jpg (Supply – Resecurity)

The Techniques, Methods, and Procedures (TTPs) map to 14 distinct MITRE ATT&CK entries, spanning preliminary entry (T1566.001) to exfiltration (T1041).

Covert C2 Infrastructure By way of Google Calendar Occasion Manipulation

The TOUGHPROGRESS module establishes persistence by creating Google Calendar occasions dated again to 2023, embedding AES-encrypted instructions inside occasion descriptions.

The malware periodically checks these occasions utilizing OAuth2 tokens, mimicking legit calendar synchronization habits.

Instructions are decrypted utilizing a hardcoded key (0x7D in XOR operations) and executed through injected svchost.exe processes.

// Pattern decryption routine for calendar occasion information
void decrypt_payload(char* encrypted_data, size_t len) {
const char KEY = 0x7D;
for (size_t i = 0; i < len; i++) {
encrypted_data[i] ^= KEY;
}
}

Execution outcomes are exfiltrated by creating new calendar occasions with BASE64-encoded output appended to seemingly benign descriptions.

For example, an occasion titled “Finances Assembly Q3” may include exfiltrated registry information inside its description area.

This method capitalizes on the trustworthiness of Google providers—76% of enterprise firewalls whitelist *.google.com domains, enabling undisturbed information transit.

The malware additional obfuscates C2 patterns utilizing dynamically generated Cloudflare Staff subdomains (*.trycloudflare[.]com) as proxy relays.

These domains resolve to Google Calendar API endpoints, making a hybrid infrastructure that blends bulletproof internet hosting with legit cloud providers.

Key Indicators of Compromise (IOCs) embody the malicious 6.jpg (SHA-256: 50124174a4ac0d65bf8b6fd66f538829d1589edc73aa7cf36502e57aa5513360) and seven.jpg information, which include XOR-encrypted PE headers.

Reminiscence evaluation reveals signature evasion methods comparable to:-

API hashing: Vital capabilities like LdrLoadDll are resolved through customized hash algorithms fairly than direct imports

Part stomping: Malware overwrites .textual content sections of legit processes with malicious code

Shimcache manipulation: Timestamps of malicious information are spoofed to match system binaries

; Instance of API hashing for kernel32!CreateProcessA
mov edi, 0x8F1D8844 ; Precomputed hash worth
name resolve_api_by_hash
take a look at eax, eax
jz error_handler

Defenders ought to monitor for irregular svchost.exe cases with open connections to *.googleapis.com/calendar/v3 and examine calendar occasion metadata for BASE64 blobs.

Resecurity recommends implementing software allowlisting for rundll32.exe and constraining Google Workspace API permissions to mitigate related campaigns.

This operation reveals the APT41’s continued evolution in exploiting belief relationships between customers, software program, and cloud suppliers.

As geopolitical tensions heighten, such hybrid C2 mechanisms will seemingly proliferate amongst state-aligned menace actors searching for believable deniability.

Velocity up and enrich menace investigations with Menace Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:APT41, Attack, Calendar, CommandandControl, Entities, Google, Government, Hackers, Malware

Post navigation

Previous Post: New Blitz Malware Attacking Windows Servers to Deploy Monero Miner
Next Post: Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials

Related Posts

Microsoft October 2025 Security Update Causes Active Directory Sync Issues on Windows Server 2025 Microsoft October 2025 Security Update Causes Active Directory Sync Issues on Windows Server 2025 Cyber Security News
AI-Powered Cyber Attacks Target Global FortiGate Devices AI-Powered Cyber Attacks Target Global FortiGate Devices Cyber Security News
North Korean Hackers Evade UN Sanctions Leveraging Cyber Capabilities, IT Workers and Crypto Activities North Korean Hackers Evade UN Sanctions Leveraging Cyber Capabilities, IT Workers and Crypto Activities Cyber Security News
Crunchyroll User Data Breach Exposes 100 GB of Information Crunchyroll User Data Breach Exposes 100 GB of Information Cyber Security News
Windows 11 Update Bug Affects Samsung Devices Windows 11 Update Bug Affects Samsung Devices Cyber Security News
Cerberus Stalkerware Exploits Google Play with Firebase Cerberus Stalkerware Exploits Google Play with Firebase Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark