Moneycontrol PRO
LAMF
LAMF

APT41 hacking group is targeting Google Calendar with this ‘new’ malware: What is it, how it works and tips to stay protected

The infection begins with spear-phishing emails that direct victims to a malicious ZIP archive hosted on a hijacked government website. The archive contains a Windows shortcut file (LNK) that mimics a PDF, alongside a directory of fake images named like arthropod photos. Clicking the LNK triggers a multi-stage infection process.
May 29, 2025 / 14:02 IST
Hacker

Hacking group APT41 is exploiting Google Calendar to conduct command-and-control (C2) operations using a newly identified malware called TOUGHPROGRESS, according to Google’s Threat Intelligence Group (GTIG). The malware campaign, discovered in October 2024, targeted multiple government entities through a compromised government website.

How TOUGHPROGRESS works

The infection begins with spear-phishing emails that direct victims to a malicious ZIP archive hosted on a hijacked government website. The archive contains a Windows shortcut file (LNK) that mimics a PDF, alongside a directory of fake images named like arthropod photos. Clicking the LNK triggers a multi-stage infection process.

The malware unfolds in three steps:

PLUSDROP, a DLL that decrypts the next stage in memory

PLUSINJECT, which uses process hollowing to inject code into svchost.exe

TOUGHPROGRESS, which communicates with an attacker-controlled Google Calendar

TOUGHPROGRESS uses Calendar events to exfiltrate stolen data and receive commands. It creates and modifies events, such as zero-minute events with embedded data on specific hard-coded dates. These are then polled and executed on the infected host.

Previous use of Google services

This is not the first time APT41 has misused Google’s infrastructure. In 2023, the group used Google Drive to deliver a backdoor called Google Command and Control (GC2), which read commands from Google Sheets and exfiltrated data.

Google’s response

Google has since neutralized the campaign by shutting down the malicious Calendar and related Workspace projects. The tech firm has notified affected organizations. However, the full scale of the intrusion remains undisclosed.

Tips to stay protected

Avoid opening links or attachments from unknown or unverified sources

Disable LNK file previews in Windows to reduce risk from disguised shortcuts

Use updated antivirus and endpoint detection tools

Regularly monitor cloud service access and permissions

APT41—also known by aliases like Winnti, Brass Typhoon, and Wicked Panda—has a history of targeting sectors like government, manufacturing, and technology across countries such as Japan, the UK, and Taiwan.

Invite your friends and family to sign up for MC Tech 3, our daily newsletter that breaks down the biggest tech and startup stories of the day

MC Tech Desk Read the latest and trending tech news—stay updated on AI, gadgets, cybersecurity, software updates, smartphones, blockchain, space tech, and the future of innovation.
first published: May 29, 2025 02:02 pm

Discover the latest Business News, Sensex, and Nifty updates. Obtain Personal Finance insights, tax queries, and expert opinions on Moneycontrol or download the Moneycontrol App to stay updated!

Subscribe to Tech Newsletters

  • On Saturdays

    Find the best of Al News in one place, specially curated for you every weekend.

  • Daily-Weekdays

    Stay on top of the latest tech trends and biggest startup news.

Advisory Alert: It has come to our attention that certain individuals are representing themselves as affiliates of Moneycontrol and soliciting funds on the false promise of assured returns on their investments. We wish to reiterate that Moneycontrol does not solicit funds from investors and neither does it promise any assured returns. In case you are approached by anyone making such claims, please write to us at grievanceofficer@nw18.com or call on 02268882347