Threat Intelligence, Malware

Google Calendar-exploiting APT41 attack campaign disrupted

Close-up of a smartphone screen displaying Google Calendar app with Google logo in the background, showing the link between Google Calendar and Google, Stafford, United Kingdom, August 8, 2024

Chinese state-sponsored hacking operation APT41, also known as Winnti, had attack infrastructure deploying the novel ToughProgress malware, which leverages Google Calendar for command-and-control, dismantled by the Google Threat Intelligence Group, BleepingComputer reports.

Intrusions commenced with the delivery of phishing emails with a link redirecting to a breached government site-hosted ZIP archive, which contains a PDF-spoofing Windows LNK file and payloads masquerading as image files, an analysis from GTIG revealed. Clicking the LNK launches the 'PlusDrop' DLL that facilitates in-memory decryption and execution of the 'PlusInject' payload, which conducts process hollowing to install ToughProgress. ToughProgress then establishes a connection with a Google Calendar endpoint, which has events planted with encrypted commands, according to researchers, who noted the covertness of the malware. Aside from removing all compromised Workspace accounts and weaponized Calendar events, Google has also updated its Safe Browsing blocklist to alert users when accessing websites implicated in APT41's attacks.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds