Mark Your Calendar: APT41 Innovative Tactics
May 28, 2025, 8:41 p.m.
Description
In late October 2024, a government website was discovered hosting malware targeting multiple government entities. The malware, dubbed TOUGHPROGRESS, utilized Google Calendar for command and control. Attributed to APT41, a PRC-based actor, the campaign targeted global organizations in various sectors. The malware infection chain involved three modules: PLUSDROP, PLUSINJECT, and TOUGHPROGRESS, employing stealth and evasion techniques. TOUGHPROGRESS used encrypted Calendar events for communication. Google Threat Intelligence Group disrupted the campaign by developing custom fingerprints, terminating attacker-controlled infrastructure, and updating Safe Browsing. APT41 has been observed using free web hosting tools and URL shorteners for malware distribution since August 2024. The blog post provides indicators of compromise and YARA rules to aid in detection and defense against similar attacks.
Tags
Date
- Created: May 28, 2025, 8:28 p.m.
- Published: May 28, 2025, 8:28 p.m.
- Modified: May 28, 2025, 8:41 p.m.
Indicators
- 50124174a4ac0d65bf8b6fd66f538829d1589edc73aa7cf36502e57aa5513360
- 469b534bec827be03c0823e72e7b4da0b84f53199040705da203986ef154406a
- 3b88b3efbdc86383ee9738c92026b8931ce1c13cd75cd1cda2fa302791c2c4fb
- 151257e9dfda476cdafd9983266ad3255104d72a66f9265caa8417a5fe1df5d7
- term-restore-satisfied-hence.trycloudflare.com
- ways-sms-pmc-shareholders.trycloudflare.com
Additional Informations
- Technology
- Media
- Transportation
- Government