Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments

Posted on May 30, 2025May 30, 2025 By CWS

Chinese language state-sponsored menace actor APT41 has focused authorities entities with malware that makes use of Google Calendar for command-and-control (C&C), Google warns.

Additionally tracked as Barium, Winnti, Depraved Panda and Depraved Spider, APT41 is understood for concentrating on organizations globally, throughout a number of sectors, together with automotive, leisure, authorities, logistics, media, delivery, and expertise sectors.

In assaults noticed in October 2024, the menace actor used a compromised authorities website to focus on different authorities entities with the ToughProgress malware that makes use of an attacker-controlled Google Calendar for C&C.

APT41 relied on phishing emails containing a hyperlink to a ZIP archive hosted on the compromised web site, which contained a LNK file posing as a PDF doc.

When opened, the LNK file launched a DLL (dubbed PlusDrop) that executed the following stage (PlusInject) designed to inject the ultimate payload (ToughProgress) into the reliable svchost course of, utilizing the method hollowing method.

Upon execution, ToughProgress would create a zero-minute Calendar occasion at a hardcoded date writing to the occasion description information collected from the compromised machine, encrypted. The malware may learn hardcoded Calendar occasions, to which the operator writes instructions.

“When an occasion is retrieved, the occasion description is decrypted and the command it incorporates is executed on the compromised host. Outcomes from the command execution are encrypted and written again to a different Calendar occasion,” Google explains.

The web large says it developed customized fingerprints it used to seek out and take down APT41-controlled Calendars, and recognized and disrupted the group’s Workspace initiatives, to disrupt its infrastructure.Commercial. Scroll to proceed studying.

Google additionally added detections to the Google Secure Looking blocklist, notified the affected organizations, and offered them with a pattern of the ToughProgress community visitors logs to assist with their detection and remediation efforts.

Moreover, Google warned that since August 2024, APT41 was seen utilizing free website hosting instruments for the distribution of malware similar to Voldemort, DustTrap, ToughProgress, and others. Tons of of entities have been served hyperlinks to those internet hosting websites.

Associated: Chinese language Hacking Group APT41 Infiltrates World Delivery and Tech Sectors

Associated: Chinese language Hacking Group ‘Earth Lamia’ Targets A number of Industries

Associated:SentinelOne Focused by North Korean IT Staff, Ransomware Teams, Chinese language Hackers

Security Week News Tags:APT41, Calendar, Chinese, Exploits, Google, Governments, Group, Hacking, Target

Post navigation

Previous Post: MITRE Publishes Post-Quantum Cryptography Migration Roadmap
Next Post: China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

Related Posts

Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal Security Week News
Cisco’s Quantum Bet: Linking Small Machines Into One Giant Quantum Computer Security Week News
Spyware Maker NSO Ordered to Pay $167 Million Over WhatsApp Hack Security Week News
Russian Qakbot Gang Leader Indicted in US Security Week News
Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers Security Week News
US Announces Botnet Takedown, Charges Against Russian Administrators Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News