News

The Chinese APT41 hacking group uses a new malware named 'ToughProgress' that abuses Google Calendar for command-and-control (C2) operations, hiding malicious activity behind a trusted cloud service.
Chinese state-sponsored hackers known as APT41 have been seen abusing Google Calendar in their newest attacks, using it as part of the C2 infrastructure.
Hacking group APT41 is exploiting Google Calendar to conduct command-and-control (C2) operations using a newly identified malware called TOUGHPROGRESS, according to Google’s Threat Intelligence ...
Google's Threat Intelligence Group (GTIG) has announced that it has discovered that the Chinese government-backed hacker group 'APT41' has used malware to write encrypted commands to Google ...
Researchers say that APT41’s exploits are part of one of the broadest espionage campaigns they’ve seen from a Chinese-linked actor “in recent years.” Researchers warn that APT41, a ...
The prolific China APT41 hacking group, known for carrying out espionage in parallel with financially motivated operations, has compromised multiple U.S. state government networks, according to ...
Recent APT41 campaigns . The attacks observed by FireEye this year have targeted companies from many industries including banking/finance, defense, government, healthcare, high tech, manufacturing ...
Chinese state-sponsored hackers known as APT41 have been seen abusing Google Calendar in their newest attacks, using it as part of the C2 infrastructure.