Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    5 shows like ‘Big Mouth’ on Netflix to stream now that animated show is over

    June 8, 2025

    Tedhar CEO Paolo Ardoino says ‘No need is needed’

    June 8, 2025

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Web3»Google shut down malware that takes advantage of Google Calendar to steal data
    Web3

    Google shut down malware that takes advantage of Google Calendar to steal data

    PineapplesUpdateBy PineapplesUpdateMay 30, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Google shut down malware that takes advantage of Google Calendar to steal data
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The Google calendar was being used by a group of hackers as a communication channel, which is to extract sensitive information from individuals according to the Google Danger Intelligence Group (GTIG). The Cyber ​​Safety Division of Tech Giant discovered an agreement with an agreement in October 2024 and found that the malware was spreading using it. Once the malware infects a device, it will create a backdoor using the Google calendar and allow the operator to extract data. GTIG has already taken calendar accounts and other systems that were being used by hackers.

    Command and Control (C2) Google calendar used by Hackers associated with China for channel

    GTIG detailed Distribution method of malwareHow it works, and measures taken by Google’s team to protect users and its product. The hacker associated with this attack is called APT41, also known as a hoodoo, a danger group is believed to be associated with the Chinese government.

    An investigation by GTIG revealed that APT41 used a javelin phishing method to give malware to the goals. Spear phishing is a target form of fishing where attackers personalize emails to specific individuals.

    These emails had a link to a zip collection which was hosted on the government’s website. When an unheard person opened the collection, it showed a shortcut LNK file (.LNK), which was disguised to look like PDF, as well as a folder.

    Google shut down malware that takes advantage of Google Calendar to steal data

    Overview of how malware works
    Photo Credit: GTIG

    This folder had seven JPG images of arthropods (insects, spiders, etc.). GTIG highlighted that the sixth and seventh entries, however, have decoys that actually have an encrypted payload and an dynamic link library (DLL) file that decryplines the payload.

    When the target clicks on the LNK file, it triggers both files. Interestingly, the LNK file also automatically removes itself and is replaced with a fake PDF, which is shown to the user. This file mentions that species shown need to be declared for export, to mask the hacking effort and avoid increasing doubt.

    Once the malware has infected a device, it operates in three different stages, where each step performs a function in sequence. GTIG stated that all three sequences are executed using various stealth techniques to avoid detection.

    The first stage decips and runs a DLL file called Plusdrop directly in memory. The second phase begins a valid Windows process and processes the process hollow – a technique used by the attackers to run malicious codes under the guise of a valid procedure – to inject the final payload.

    The final payload, tuffyprogress, executes malicious tasks on the device and communicates with the attacker through the Google calendar. It uses a cloud-based app as a communication channel through Command and Control (C2) technology.

    The malware adds a zero-minint calendar event to a hardcoded date (30 May, 2023), which stores encrypted data from the computer compromised in the details of the event.

    It also creates two other incidents on hardcoded dates (30 and 31, 2023), which gives the attacker a back door to communicate with malware. Turdprogress regularly scans the calendar for these two events.

    When the attacker sends an encrypted command, he decipses it and executes the command. Then, it sends the results back by creating another zero-minute phenomenon with encrypted output.

    To disrupt the malware campaign, GTIG created APT41’s Google calendar accounts identified and removed custom detection methods. The team also discontinued the attacking Google workspace projects, making the infrastructure used in the operation effectively disabled.

    Additionally, the tech giants also updated their malware detection system and blocked malicious domains and URLs using Google safe browsing.

    GTIG has also informed the affected outfits, and provided them with details about the actor of the network traffic and the actor of the danger, which is to help in finding, probe and response efforts.

    advantage calendar data Google Malware shut steal takes
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFans of the battlefield are convinced that something big is getting bigger on June 17
    Next Article Every house has a cell signal sweet spot – this trick finds you
    PineapplesUpdate
    • Website

    Related Posts

    Web3

    Tedhar CEO Paolo Ardoino says ‘No need is needed’

    June 8, 2025
    Web3

    Coinbase, Bit Global and Legal Fight on WBTC Delisting

    June 8, 2025
    Web3

    EA Sports FC 25, FBC: Firebreak and more Xbox Game Pass in June

    June 8, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025594 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025536 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025465 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Meta delay entrusts ‘Bhamoth’ AI model, Openi and Google more than one more head start

    May 16, 20250 Views

    Filecoin, Lockheed Martin Test IPFS in space

    May 16, 20250 Views

    The new coding agent of Chatgpt is very big, even if you are not a programmer

    May 16, 20250 Views
    Our Picks

    5 shows like ‘Big Mouth’ on Netflix to stream now that animated show is over

    June 8, 2025

    Tedhar CEO Paolo Ardoino says ‘No need is needed’

    June 8, 2025

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.