APT41 Hackers Using Google Calendar for Malware Command-and-Control To Attack Government Entities

A recent campaign by Chinese state-sponsored threat actor APT41 has unveiled a novel exploitation of Google Calendar for malware command-and-control (C2) operations, marking a significant escalation in cyberespionage tactics. The group, tracked under aliases including BARIUM and Brass Typhoon, targeted Taiwanese government entities through a multi-stage attack chain combining spearphishing, image-based payload delivery, and covert […]

The post APT41 Hackers Using Google Calendar for Malware Command-and-Control To Attack Government Entities appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: