Google Thwarts APT41's Stealthy Malware Attack Using Google Calendar for Command Operations
May 29, 2025
On May 29, 2025, Google disclosed that the China-linked hacking group APT41 exploited Google Calendar to conduct command-and-control operations using a new malware called TOUGHPROGRESS.
This malware employs Google Calendar as a mechanism to conceal malicious activities within a trusted cloud service, effectively blending in with legitimate operations.
APT41 delivered the malware through spear phishing emails that contained a ZIP file disguised as an export declaration document, which included a malicious Windows LNK file and an encrypted payload.
The ZIP file also contained a DLL file named 'PlusDrop' that decrypts and executes the next stage of the malware entirely in memory, minimizing detection risks.
TOUGHPROGRESS operates in three stealthy stages: the first stage, PLUSDROP, decrypts the payload; the second stage, PLUSINJECT, injects malicious code into legitimate processes like svchost.exe; and the final stage executes commands from the attacker.
The malware polls hidden events in Google Calendar for instructions and returns execution results as new calendar events, facilitating data exfiltration and command receipt.
While specific victims were not disclosed, Google collaborated with Mandiant to notify affected organizations and provided them with threat intelligence and network logs to aid in detection.
In response to the campaign, Google terminated all related Workspace accounts and identified the attacker-controlled Google Calendar instances, enhancing user security.
Google's Threat Intelligence Group dismantled the infrastructure used by APT41 and developed custom fingerprints to prevent future abuses of its services.
APT41, also known as Axiom or Blackfly, is a prolific nation-state group that has targeted various sectors, including government, shipping, media, and technology.
Google identified the malicious activity in late October 2024, when malware hosted on a compromised government website was found targeting multiple government entities.
This incident marks the second time APT41 has exploited Google services, following a previous incident in April 2023 involving a Go-based tool delivered via Google Drive.
Summary based on 3 sources
Get a daily email with more Tech stories
Sources

BleepingComputer • May 28, 2025
APT41 malware abuses Google Calendar for stealthy C2 communication
The Hacker News • May 29, 2025
Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations
Security Affairs • May 29, 2025
China-linked APT41 used Google Calendar as C2 to control its TOUGHPROGRESS malware