Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Google Detects Chinese-Linked Cyber Attacks Using Calendar Service
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Technology

Google Detects Chinese-Linked Cyber Attacks Using Calendar Service

Highlights

  • Google disrupted APT41’s attacks using Google Calendar as a control channel.

  • The group used malware named TOUGHPROGRESS placed through a government website.

  • Google introduced new safeguards and monitoring to block calendar-based threats.

Kaan Demirel
Last updated: 28 May, 2025 - 10:30 pm 10:30 pm
Kaan Demirel 1 day ago
Share
SHARE

Cybersecurity has become an increasing priority as digital threats grow more complex and exploit everyday tools. Recent reports indicate threat actors leveraged widely used cloud-based applications, drawing attention to potential vulnerabilities even in mainstream services. Many organizations now face mounting pressure to monitor not just conventional attack vectors but also seemingly benign productivity platforms, adding new layers to the defense challenge.

Contents
How Did Google Identify the Cyber Intrusion?What Role Did APT41 Play in the Incident?What Measures Did Google Implement in Response?

Reports last year and earlier information about the hacking group known as APT41 revealed a pattern of attacks against a broad selection of industries, with targets spanning technology, healthcare, and government. In previous cases, APT41 often relied on custom malware and spearphishing delivered via compromised infrastructure, but exploitation of Google Calendar had not been as widely documented at the time. Malicious use of cloud services for covert communications has seen a steady rise, indicating a trend toward subtler, more evasive attack strategies that blend with ordinary user activity.

How Did Google Identify the Cyber Intrusion?

Google’s Threat Intelligence Group disclosed the discovery of a government website being manipulated to spread a unique malware strain called TOUGHPROGRESS. This software enabled remote control by embedding instructions inside Google Calendar, enabling attackers to mask their activity as normal cloud usage. The method involved inserting encrypted C2 instructions into Calendar events, exploiting the platform’s traffic to avoid immediate detection.

What Role Did APT41 Play in the Incident?

Investigators attributed the attack to APT41, a threat group suspected of ties to the Chinese Ministry of State Security, also known as Wicked Panda, Winnti, and Double Dragon. The group orchestrated the campaign by deploying spearphishing emails and decoy files from an exploited government website, embedding commands within calendar metadata to circumvent conventional security monitoring. Google described the capabilities of TOUGHPROGRESS to manipulate Calendar events as central to this stealth tactic.

What Measures Did Google Implement in Response?

Google responded by creating analytic “fingerprints” to systematically identify and remove attacker-operated Google Calendars. The company dismantled related Workspace projects and reinforced its detection systems with new malicious domain entries on Safe Browsing blocklists.

“We have also terminated attacker-controlled Workspace projects, effectively dismantling the infrastructure that APT41 relied on for this campaign,”

Patrick Whitsell from Google emphasized in a company update. These actions aimed to neutralize existing threats and mitigate similar C2 techniques in future campaigns.

The use of cloud services such as Google Calendar for malicious command and control demonstrates a strategic pivot by advanced groups like APT41. While exploitation of productivity platforms has been previously observed, this approach highlights the ongoing cat-and-mouse dynamic between security teams and threat actors who are continually evolving their strategies. As attackers adapt by hiding within typical user workflows, defenders must enhance visibility and analytics across their cloud infrastructure to detect subtle anomalies. Readers invested in system protection should prioritize regular monitoring of cloud activity logs, keep their platforms updated, and stay informed about cloud-specific tactics observed in recent threat reports.

  • Google disrupted APT41’s attacks using Google Calendar as a control channel.
  • The group used malware named TOUGHPROGRESS placed through a government website.
  • Google introduced new safeguards and monitoring to block calendar-based threats.
You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Investors Demand Musk Commit to Tesla as Sales Drop

AI Robocall Firms Admit to Voter Intimidation in Biden Case Settlement

Cities Drive Cleaner Air as Electric Vehicles Gain Momentum

Tesla’s Top Executive Team Drives Key Innovations at the Company

Global Powers Accelerate Digital Economy Strategies Across Five Key Pillars

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Tesla Brings iPhone Live Charging Updates to Supercharger Users
Next Article Analyst Cites Concerns as Future Fund Sells All Tesla Shares

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Wordle Players Tackle Double Letter Challenge With ‘IDIOM’ Solution
Gaming
Tesla Tests Compact Model Y Prototype at Fremont Facility
Electric Vehicle
Treasury Department Stops Crypto Scam Network With Sanctions
Cybersecurity
Tesla Schedules Robotaxi and Self-Delivery Launches for June
Electric Vehicle
Tesla Sets June 12 for Robotaxi Debut in Austin
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?