News
The Chinese APT41 hacking group uses a new malware named 'ToughProgress' that abuses Google Calendar for command-and-control (C2) operations, hiding malicious activity behind a trusted cloud service.
Hosted on MSN1mon
Chinese hackers use Google Calendar in stealthy new attack - MSNChinese state-sponsored hackers known as APT41 have been seen abusing Google Calendar in their newest attacks, using it as part of the C2 infrastructure.
Hacking group APT41 is exploiting Google Calendar to conduct command-and-control (C2) operations using a newly identified malware called TOUGHPROGRESS, according to Google’s Threat Intelligence ...
Google's Threat Intelligence Group (GTIG) has announced that it has discovered that the Chinese government-backed hacker group 'APT41' has used malware to write encrypted commands to Google ...
On Feb. 21, researchers next observed APT41 switching gears to exploit a Cisco RV320 router (Cisco’s WAN VPN routers for small businesses) at a telecommunications organization.
State-backed hacking group APT41 exploited vulnerabilities in Citrix Netscaler, Cisco routers and Zoho ManageEngine Desktop Central. But a COVID-19 lockdown may have slowed their efforts.
The group then went on to exploit a Cisco RV320 router at a telecoms firm on February 21, possibly using a Metasploit module combining CVE-2019-1653 and CVE-2019-1652. APT41 was even quicker to ...
Theft of Covid benefits by Chinese hackers called APT41 is the first pandemic fraud by foreign, state-sponsored hackers that the U.S. has acknowledged publicly.
Chinese state-sponsored hackers known as APT41 have been seen abusing Google Calendar in their newest attacks, using it as part of the C2 infrastructure.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results