News
The infection begins with spear-phishing emails that direct victims to a malicious ZIP archive hosted on a hijacked ...
Chinese state-sponsored threat actor APT41 has targeted government entities with malware that uses Google Calendar for ...
The Chinese APT41 hacking group uses a new malware named 'ToughProgress' that exploits Google Calendar for command-and-control (C2) operations, hiding malicious activity behind a trusted cloud ...
A new report reveals that Chinese state-backed hacking group APT41 has developed a novel method to conduct cyber-espionage by ...
APT41, a notorious hacking group, is now targeting Google Calendar with a sophisticated new malware that begins its infection process through spear-phishing emails.
China-linked hackers used Google Calendar as a command and control (C2) channel to steal data from infected devices.
Google found Chinese hackers abusing Google CalendarThe service was used to host malicious instructions and to exfiltrate resultsToughProgress campaign was carried out by Chinese state-sponsored ...
has announced that it has discovered that the Chinese government-backed hacker group 'APT41' has used malware to write encrypted commands to Google Calendar and use it for command and control (C2 ...
"When used together, CAV and crypting services allow criminals to obfuscate malware, making it undetectable and enabling ...
In October, Google’s Threat Intelligence Group spotted Chinese government hackers from APT41 deploying malware that abused Google Calendar to steal data and execute operations on compromised ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results