APT41 Hackers Leverage Google Calendar for Malware C2 in Attacks on Government Entities
3 Articles
3 Articles
How Chinese Hackers Hijacked Google Calendar for Espionage | #cybercrime | #infosec - National Cyber Security Consulting
A sophisticated Chinese state-sponsored cyber threat group, APT41, has been found using an unprecedented method for malware command and control: Google Calendar. This discovery, highlighted in a new report by US-based cybersecurity firm Resecurity, underscores the evolving and often unexpected tactics employed by state-backed actors. APT41, also known as BARIUM, Wicked Panda, and Brass Typhoon, […] Thank you for subscribing to our RSS feed! The …


APT41 Hackers Leverage Google Calendar for Malware C2 in Attacks on Government Entities
The Chinese state-sponsored threat actor APT41, also known as BARIUM, Wicked Panda, and Brass Typhoon, has been reported to exploit Google Calendar as a command-and-control (C2) mechanism in a recent campaign targeting a Taiwanese government website. This sophisticated group, active since at least 2012, is notorious for blending cyber espionage with financially motivated cybercrime, hitting […] The post APT41 Hackers Leverage Google Calendar for…
Coverage Details
Bias Distribution
- There is no tracked Bias information for the sources covering this story.
To view factuality data please Upgrade to Premium