News
The Chinese APT41 hacking group uses a new malware named 'ToughProgress' that exploits Google Calendar for command-and-control (C2) operations, hiding malicious activity behind a trusted cloud ...
Chinese state-sponsored threat actor APT41 has targeted government entities with malware that uses Google Calendar for ...
The infection begins with spear-phishing emails that direct victims to a malicious ZIP archive hosted on a hijacked ...
Google malware threats are getting wilder but the Calendar app being the ruse to attack businesses is a new method on the check list.
has announced that it has discovered that the Chinese government-backed hacker group 'APT41' has used malware to write encrypted commands to Google Calendar and use it for command and control (C2 ...
APT41, a notorious hacking group, is now targeting Google Calendar with a sophisticated new malware that begins its infection process through spear-phishing emails.
In October, Google’s Threat Intelligence Group spotted Chinese government hackers from APT41 deploying malware that abused Google Calendar to steal data and execute operations on compromised ...
"When used together, CAV and crypting services allow criminals to obfuscate malware, making it undetectable and enabling ...
The group, known as APT41 or HOODOO ... What made this attack unusual was the use of Google Calendar as a communication tool. The malware created short, zero-minute events on specific dates.
Google's Threat Intelligence Group revealed that a Chinese hacker group used Google Calendar to steal sensitive information.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results