APT41 Malware Exploits Google Calendar for Stealthy Command-and-Control Communication

Just the facts
APT41 Malware Exploits Google Calendar for Stealthy Command-and-Control Communication
Category: Technology, 2025-05-28 22:04

The Chinese hacking group APT41 has been detected using a new malware, 'ToughProgress', which leverages Google Calendar as a channel for command-and-control (C2) operations, according to Google's Threat Intelligence team.

The Chinese advanced persistent threat (APT) group known as APT41 has been identified using a newly discovered malware named 'ToughProgress'. This malware exploits Google Calendar, a widely used cloud-based scheduling service, to conduct command-and-control (C2) communications. By utilizing Google Calendar, the attackers are able to mask their malicious traffic within legitimate cloud service activity, making detection more difficult for security systems. The campaign was uncovered by Google's Threat Intelligence team, which monitors threats to Google's infrastructure and user base. APT41 is a well-known cyber-espionage group that has previously targeted organizations in various sectors, including healthcare, telecommunications, and finance. The use of trusted cloud services for C2 operations is a growing trend among threat actors, as it allows them to evade traditional security measures that may not flag traffic to reputable domains like Google. The discovery of 'ToughProgress' highlights the ongoing evolution of cyberattack techniques and the challenges faced by defenders in distinguishing malicious activity from normal cloud service usage.

Source parameters

Source scores

Importance: 80% Interest: 85% Credibility: 92% Propaganda: 3% Removed emotions: 1