Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework

Posted on September 5, 2025September 5, 2025 By CWS

Cybersecurity researchers have recognized a complicated new command-and-control framework that exploits professional Google Calendar APIs to ascertain covert communication channels between attackers and compromised programs.

The MeetC2 framework, found in September 2025, represents a regarding evolution in adversarial ways the place menace actors abuse trusted cloud companies to bypass conventional safety controls and evade detection mechanisms.

The framework operates by masquerading malicious site visitors as routine enterprise communications by means of Google’s widely-trusted domains, particularly “oauth2.googleapis.com” and “www.googleapis.com”.

This strategy permits malicious actions to mix seamlessly with regular organizational site visitors, making detection considerably tougher for safety groups.

The cross-platform compatibility throughout macOS and Linux programs additional amplifies its potential impression on numerous enterprise environments.

Deriv Tech researchers famous that the framework’s design demonstrates a complicated understanding of recent safety architectures and cloud service abuse strategies.

The proof-of-concept implementation highlights how simply adversaries can leverage professional SaaS platforms for malicious functions, exploiting the inherent belief organizations place in main cloud suppliers.

The assault methodology facilities round a polling-based communication system the place compromised brokers ship GET requests each 30 seconds to particular Google Calendar API endpoints.

When operators must subject instructions, they create calendar occasions with embedded directions within the abstract subject, formatted as “Assembly from no one: [COMMAND]”.

Assault chain (Supply – Medium)

The sufferer agent identifies these command occasions throughout common polling cycles, extracts the instructions, executes them regionally, and updates the identical calendar occasion with execution outcomes embedded inside [OUTPUT] [/OUTPUT] parameters within the description subject.

Technical Implementation and Evasion Mechanisms

The MeetC2 framework’s technical structure reveals refined evasion capabilities that exploit the ubiquity and trusted nature of Google companies.

The authentication course of makes use of normal OAuth2 flows, requiring attackers to create professional Google Cloud Console tasks and repair accounts with calendar entry permissions.

This strategy ensures all communications seem as approved API interactions somewhat than suspicious community site visitors.

The implementation requires minimal infrastructure, working solely by means of Google’s present Calendar API infrastructure.

Operators authenticate by means of service accounts configured with “Make modifications to occasions” permissions on shared calendars.

The polling mechanism employs a 30-second interval, hanging a stability between operational responsiveness and avoiding extreme API requests that may set off charge limiting or suspicious exercise alerts.

Code execution happens by means of command extraction from calendar occasion summaries, with outcomes uploaded again to the identical occasion’s description subject.

This bidirectional communication mannequin creates an entire command-and-control channel whereas sustaining the looks of professional calendar synchronization actions.

The framework helps focused command execution utilizing host-specific syntax like “exec @host:command” or broadcast instructions throughout a number of compromised programs concurrently.

The persistence and stealth traits of MeetC2 make it notably regarding for enterprise safety groups, because the framework generates no suspicious community patterns and leverages companies that organizations explicitly whitelist for enterprise operations.

Enhance your SOC and assist your staff shield what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:APIs, Calendar, Communication, Framework, Google, Hackers, Leverages, MeetC2, Serverless

Post navigation

Previous Post: Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign
Next Post: Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

Related Posts

0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets Cyber Security News
Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks Cyber Security News
How Smart Timesheet Software Is Changing the Way of Work Cyber Security News
Understanding OWASP Top 10 – Mitigating Web Application Vulnerabilities Cyber Security News
UK Retailer Co-op Confirms 6.5 Million Members’ Data Stolen in Massive Cyberattacks Cyber Security News
New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News