Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments

Posted on May 30, 2025May 30, 2025 By CWS

Chinese language state-sponsored menace actor APT41 has focused authorities entities with malware that makes use of Google Calendar for command-and-control (C&C), Google warns.

Additionally tracked as Barium, Winnti, Depraved Panda and Depraved Spider, APT41 is understood for concentrating on organizations globally, throughout a number of sectors, together with automotive, leisure, authorities, logistics, media, delivery, and expertise sectors.

In assaults noticed in October 2024, the menace actor used a compromised authorities website to focus on different authorities entities with the ToughProgress malware that makes use of an attacker-controlled Google Calendar for C&C.

APT41 relied on phishing emails containing a hyperlink to a ZIP archive hosted on the compromised web site, which contained a LNK file posing as a PDF doc.

When opened, the LNK file launched a DLL (dubbed PlusDrop) that executed the following stage (PlusInject) designed to inject the ultimate payload (ToughProgress) into the reliable svchost course of, utilizing the method hollowing method.

Upon execution, ToughProgress would create a zero-minute Calendar occasion at a hardcoded date writing to the occasion description information collected from the compromised machine, encrypted. The malware may learn hardcoded Calendar occasions, to which the operator writes instructions.

“When an occasion is retrieved, the occasion description is decrypted and the command it incorporates is executed on the compromised host. Outcomes from the command execution are encrypted and written again to a different Calendar occasion,” Google explains.

The web large says it developed customized fingerprints it used to seek out and take down APT41-controlled Calendars, and recognized and disrupted the group’s Workspace initiatives, to disrupt its infrastructure.Commercial. Scroll to proceed studying.

Google additionally added detections to the Google Secure Looking blocklist, notified the affected organizations, and offered them with a pattern of the ToughProgress community visitors logs to assist with their detection and remediation efforts.

Moreover, Google warned that since August 2024, APT41 was seen utilizing free website hosting instruments for the distribution of malware similar to Voldemort, DustTrap, ToughProgress, and others. Tons of of entities have been served hyperlinks to those internet hosting websites.

Associated: Chinese language Hacking Group APT41 Infiltrates World Delivery and Tech Sectors

Associated: Chinese language Hacking Group ‘Earth Lamia’ Targets A number of Industries

Associated:SentinelOne Focused by North Korean IT Staff, Ransomware Teams, Chinese language Hackers

Security Week News Tags:APT41, Calendar, Chinese, Exploits, Google, Governments, Group, Hacking, Target

Post navigation

Previous Post: MITRE Publishes Post-Quantum Cryptography Migration Roadmap
Next Post: China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

Related Posts

Cellcom Service Disruption Caused by Cyberattack Security Week News
Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified Security Week News
Europol-Coordinated Global Operation Takes Down Pro-Russian Cybercrime Network Security Week News
Aspire Rural Health System Data Breach Impacts Nearly 140,000 Security Week News
Kosovar Administrator of Cybercrime Marketplace Extradited to US Security Week News
EU Cybersecurity Agency ENISA Launches European Vulnerability Database Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data
  • Tenable Confirms Data Breach – Hackers Accessed Customers Contact Details
  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data
  • Tenable Confirms Data Breach – Hackers Accessed Customers Contact Details
  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News