Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework

Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework

Posted on September 5, 2025September 5, 2025 By CWS

Cybersecurity researchers have recognized a complicated new command-and-control framework that exploits professional Google Calendar APIs to ascertain covert communication channels between attackers and compromised programs.

The MeetC2 framework, found in September 2025, represents a regarding evolution in adversarial ways the place menace actors abuse trusted cloud companies to bypass conventional safety controls and evade detection mechanisms.

The framework operates by masquerading malicious site visitors as routine enterprise communications by means of Google’s widely-trusted domains, particularly “oauth2.googleapis.com” and “www.googleapis.com”.

This strategy permits malicious actions to mix seamlessly with regular organizational site visitors, making detection considerably tougher for safety groups.

The cross-platform compatibility throughout macOS and Linux programs additional amplifies its potential impression on numerous enterprise environments.

Deriv Tech researchers famous that the framework’s design demonstrates a complicated understanding of recent safety architectures and cloud service abuse strategies.

The proof-of-concept implementation highlights how simply adversaries can leverage professional SaaS platforms for malicious functions, exploiting the inherent belief organizations place in main cloud suppliers.

The assault methodology facilities round a polling-based communication system the place compromised brokers ship GET requests each 30 seconds to particular Google Calendar API endpoints.

When operators must subject instructions, they create calendar occasions with embedded directions within the abstract subject, formatted as “Assembly from no one: [COMMAND]”.

Assault chain (Supply – Medium)

The sufferer agent identifies these command occasions throughout common polling cycles, extracts the instructions, executes them regionally, and updates the identical calendar occasion with execution outcomes embedded inside [OUTPUT] [/OUTPUT] parameters within the description subject.

Technical Implementation and Evasion Mechanisms

The MeetC2 framework’s technical structure reveals refined evasion capabilities that exploit the ubiquity and trusted nature of Google companies.

The authentication course of makes use of normal OAuth2 flows, requiring attackers to create professional Google Cloud Console tasks and repair accounts with calendar entry permissions.

This strategy ensures all communications seem as approved API interactions somewhat than suspicious community site visitors.

The implementation requires minimal infrastructure, working solely by means of Google’s present Calendar API infrastructure.

Operators authenticate by means of service accounts configured with “Make modifications to occasions” permissions on shared calendars.

The polling mechanism employs a 30-second interval, hanging a stability between operational responsiveness and avoiding extreme API requests that may set off charge limiting or suspicious exercise alerts.

Code execution happens by means of command extraction from calendar occasion summaries, with outcomes uploaded again to the identical occasion’s description subject.

This bidirectional communication mannequin creates an entire command-and-control channel whereas sustaining the looks of professional calendar synchronization actions.

The framework helps focused command execution utilizing host-specific syntax like “exec @host:command” or broadcast instructions throughout a number of compromised programs concurrently.

The persistence and stealth traits of MeetC2 make it notably regarding for enterprise safety groups, because the framework generates no suspicious community patterns and leverages companies that organizations explicitly whitelist for enterprise operations.

Enhance your SOC and assist your staff shield what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:APIs, Calendar, Communication, Framework, Google, Hackers, Leverages, MeetC2, Serverless

Post navigation

Previous Post: Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign
Next Post: Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

Related Posts

QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed Cyber Security News
UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports Cyber Security News
Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability Cyber Security News
Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions Cyber Security News
Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Cyber Security News
20,000 WordPress Sites Affected by Backdoor Vulnerability Allowing Malicious Admin User Creation 20,000 WordPress Sites Affected by Backdoor Vulnerability Allowing Malicious Admin User Creation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News