APT41 Uses Google Calendar as Covert C2 in Stealthy Cyberespionage Campaign

APT41 Uses Google Calendar as Covert C2 in Stealthy Cyberespionage Campaign

Google Threat Intelligence Group uncovered a sophisticated APT41 campaign called TOUGHPROGRESS that uses Google Calendar as a covert command-and-control channel. The campaign demonstrates advanced evasion techniques and strategic targeting of government entities, highlighting the evolving tactics of state-backed cyber espionage.
#APT41 #TOUGHPROGRESS #GoogleCalendar #CyberEspionage #CloudServiceAbuse

Keypoints

  • TOUGHPROGRESS is a modular malware campaign attributed to APT41, targeting government entities.
  • The malware uses Google Calendar to communicate with attackers, creating events that encode data and commands.
  • Advanced evasion techniques include in-memory execution, DLL injection, and control flow obfuscation.
  • Disruption was achieved through detection signatures, account takedowns, and updating Google Safe Browsing blocklists.
  • Previous activities of APT41 include malware delivery via cloud platforms like Google Drive and Cloudflare Workers.

Read More: https://securityonline.info/apt41-uses-google-calendar-as-covert-c2-in-stealthy-cyberespionage-campaign/