Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments

Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments

Posted on May 30, 2025May 30, 2025 By CWS

Chinese language state-sponsored menace actor APT41 has focused authorities entities with malware that makes use of Google Calendar for command-and-control (C&C), Google warns.

Additionally tracked as Barium, Winnti, Depraved Panda and Depraved Spider, APT41 is understood for concentrating on organizations globally, throughout a number of sectors, together with automotive, leisure, authorities, logistics, media, delivery, and expertise sectors.

In assaults noticed in October 2024, the menace actor used a compromised authorities website to focus on different authorities entities with the ToughProgress malware that makes use of an attacker-controlled Google Calendar for C&C.

APT41 relied on phishing emails containing a hyperlink to a ZIP archive hosted on the compromised web site, which contained a LNK file posing as a PDF doc.

When opened, the LNK file launched a DLL (dubbed PlusDrop) that executed the following stage (PlusInject) designed to inject the ultimate payload (ToughProgress) into the reliable svchost course of, utilizing the method hollowing method.

Upon execution, ToughProgress would create a zero-minute Calendar occasion at a hardcoded date writing to the occasion description information collected from the compromised machine, encrypted. The malware may learn hardcoded Calendar occasions, to which the operator writes instructions.

“When an occasion is retrieved, the occasion description is decrypted and the command it incorporates is executed on the compromised host. Outcomes from the command execution are encrypted and written again to a different Calendar occasion,” Google explains.

The web large says it developed customized fingerprints it used to seek out and take down APT41-controlled Calendars, and recognized and disrupted the group’s Workspace initiatives, to disrupt its infrastructure.Commercial. Scroll to proceed studying.

Google additionally added detections to the Google Secure Looking blocklist, notified the affected organizations, and offered them with a pattern of the ToughProgress community visitors logs to assist with their detection and remediation efforts.

Moreover, Google warned that since August 2024, APT41 was seen utilizing free website hosting instruments for the distribution of malware similar to Voldemort, DustTrap, ToughProgress, and others. Tons of of entities have been served hyperlinks to those internet hosting websites.

Associated: Chinese language Hacking Group APT41 Infiltrates World Delivery and Tech Sectors

Associated: Chinese language Hacking Group ‘Earth Lamia’ Targets A number of Industries

Associated:SentinelOne Focused by North Korean IT Staff, Ransomware Teams, Chinese language Hackers

Security Week News Tags:APT41, Calendar, Chinese, Exploits, Google, Governments, Group, Hacking, Target

Post navigation

Previous Post: MITRE Publishes Post-Quantum Cryptography Migration Roadmap
Next Post: China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

Related Posts

High-Severity Vulnerabilities Patched in Chrome, Firefox High-Severity Vulnerabilities Patched in Chrome, Firefox Security Week News
Asheville Eye Associates Says 147,000 Impacted by Data Breach Asheville Eye Associates Says 147,000 Impacted by Data Breach Security Week News
Alumni, Student, and Staff Information Stolen From Harvard University Alumni, Student, and Staff Information Stolen From Harvard University Security Week News
2025 Sees Surge in Cybersecurity M&A Activity 2025 Sees Surge in Cybersecurity M&A Activity Security Week News
Apple Devices Approved for NATO Classified Use Apple Devices Approved for NATO Classified Use Security Week News
CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future? CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future? Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark