APT41 Targets Google Calendar for Malware Control Operations

Published:

spot_img

APT41’s Innovative Malware Tactics Exposed

On May 29, 2025, Google reported a significant cybersecurity breach linked to the Chinese state-sponsored group known as APT41. This sophisticated threat actor has utilized malware named TOUGHPROGRESS, notably employing Google Calendar as a method for command-and-control (C2) operations. This revelation sheds light on the evolving tactics that cybercriminals use in modern attacks.

Discovery of TOUGHPROGRESS

Google’s Threat Intelligence Group (GTIG) first learned of this malicious activity in late October 2024. The malware was found hosted on a compromised government website, specifically targeting several governmental organizations. As Patrick Whitsell, a researcher at GTIG noted, the use of legitimate cloud services for C2 is a common tactic among threat actors. This method allows them to blend malicious activities with normal behavior, making detection challenging.

The Background of APT41

APT41, also recognized by various other names such as Axiom, Blackfly, and Wicked Panda, has a notorious background in targeting governments and organizations across various sectors, including shipping, media, technology, and automotive industries. This persistent nation-state group has been associated with numerous cyber campaigns, often demonstrating a high level of technical sophistication.

In July 2024, Google unveiled that multiple targets in Italy, Spain, Taiwan, Thailand, Turkey, and the U.K. had fallen victim to APT41’s "sustained campaign." This operation involved a combination of web shells and dropper malware like ANTSWORD and BLUEBEAM. Earlier in 2024, another subset of APT41 was identified as attacking Japanese firms in manufacturing and energy sectors through campaigns dubbed “RevivalStone,” showcasing the broad geographic and sectoral reach of their activities.

The Attack Methodology

The attack chain initiated by TOUGHPROGRESS began with spear-phishing emails. These emails contained links to ZIP files hosted on the exploited government website. Within the ZIP archive were files that masqueraded as PDFs but were actually deceptive. Specifically, the archive included a Windows shortcut (LNK) designed to engage users, presenting a decoy PDF that required the declaration of certain arthropod species for export. Notably, the last two images in the sequence were fake, leading users toward the malicious payload.

Whitsell explained that once the LNK file was activated, it triggered an encrypted payload concealed within the first file, which was decrypted by a subsequent DLL file executed through the user’s action. This intricate design allows for evasion through various stealth techniques, including memory-only payloads and control flow obfuscation.

Malware Components

TOUGHPROGRESS consists of three primary components that operate in a sequence to execute its tasks:

  1. PLUSDROP: A DLL file responsible for decrypting and executing the next stage in memory.
  2. PLUSINJECT: This component performs process hollowing within a legitimate “svchost.exe” process, injecting the final payload.
  3. TOUGHPROGRESS: The main malware utilizing Google Calendar for C2 operations.

The malware’s design enables it to read and write events on a compromised Google Calendar account. By creating zero-minute events on a predetermined date, it effectively stores harvested data within the event descriptions. Attackers then inject encrypted commands into these events, which the malware retrieves, decrypts, and executes.

Google’s Response and Mitigation Efforts

In response to this breach, Google has taken proactive measures by shutting down the malicious Google Calendar and terminating associated Workspace projects. This intervention effectively neutralized the ongoing campaign, and the affected organizations received notifications regarding the threat.

Previous Utilization of Google Services

This isn’t the first instance where APT41 has leveraged Google’s services for nefarious purposes. In April 2023, the group targeted a Taiwanese media organization by delivering a Go-based open-source red teaming tool dubbed Google Command and Control (GC2). Similar to TOUGHPROGRESS, GC2 was hosted on Google Drive within password-protected files, illustrating a pattern of exploiting cloud infrastructure to facilitate cyber operations.


As cyber threats continue to evolve, understanding the methods employed by threat actors like APT41 is essential for enhancing cybersecurity efforts and securing digital landscapes across various sectors.

spot_img

Related articles

Recent articles

Ajman Unveils $272 Million Investment in Port Development

Major Upgrades Planned for Ajman Ports: A Gateway to Global Trade Ajman Ports is set for significant enhancements as it strives to become a key...

GovTech Innovation Forum & Awards: Envisioning a Reimagined Future

Celebrating Innovation: The GovTech Innovation Forum & Awards 2025 A Visionary Gathering In an era where technology is reshaping the very fabric of our lives, the...

Savastan0: The 2025 Dark Web Marketplace Everyone’s Talking About

The Intriguing World of Savastan0: A Deep Dive into Cybercrime On a chilly November evening in 2019, as I sat in a dimly lit coffee...

Kling AI Impersonation Ads Spread RAT Malware to Over 22 Million Users

Beware of Malicious Ads Targeting Kling AI Users Introduction to Scams on Social Media Recent reports highlight a troubling trend in digital security, particularly targeting users...