Security News Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments

Brownie2019

Level 23
Thread author
Verified
Well-known
Mar 9, 2019
874
Chinese state-sponsored threat actor APT41 has targeted government entities with malware that uses Google Calendar for command-and-control (C&C), Google warns.

Also tracked as Barium, Winnti, Wicked Panda and Wicked Spider, APT41 is known for targeting organizations globally, across multiple sectors, including automotive, entertainment, government, logistics, media, shipping, and technology sectors.

In attacks observed in October 2024, the threat actor used a compromised government site to target other government entities with the ToughProgress malware that uses an attacker-controlled Google Calendar for C&C.
APT41 relied on phishing emails containing a link to a ZIP archive hosted on the compromised website, which contained a LNK file posing as a PDF document.
When opened, the LNK file launched a DLL (dubbed PlusDrop) that executed the next stage (PlusInject) designed to inject the final payload (ToughProgress) into the legitimate svchost process, using the process hollowing technique.
...
 
Last edited by a moderator:

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
9,052
Users on Windows 11 with enabled Smart App Control are protected against such attacks (the LNK file will be blocked).
Others are vulnerable, except when security can block shortcuts or detect post-execution fileless techniques (like process hollowing):
This malware has three distinct modules, deployed in series, each with a distinct function. Each module also implements stealth and evasion techniques, including memory-only payloads, encryption, compression, process hollowing, control flow obfuscation, and leveraging Google Calendar for C2.

 
Last edited:

Parkinsond

Level 18
Dec 6, 2023
895

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
9,052
The attackers enhanced the attack vector known for several years:
phishing ---> ZIP archive ----> LNK -----> RunDLL32 -----> DLL loader (decrypted payload) ----> Process Hollowing -----> abusing legal cloud services for C2

State-sponsored phishing is often successful, so antivirus software attempts to detect the attack when the DLL loader is executed. When RunDLL32 LOLBin is used, some AVs can efficiently block the attack via Advanced Threat Protection features (like Microsoft Defender ASR rules) or LOLBin restrictions (like Comodo Script Analysis). Such loaders have a low level of suspicious IOCs on the pre-execution stage, so the attack can be detected by Machine Learning only after some time. This time can be longer if the attackers use a runtime FUD malware (unique crypter). It is probable that this was the case in this smart attack.
Top AVs can detect Process Hollowing methods (especially Enterprise versions). But I am not sure how effective they are against evolving attack methods.
 
Last edited:

piquiteco

Level 16
Verified
Top Poster
Well-known
Oct 16, 2022
775
Users on Windows 11 with enabled Smart App Control are protected against such attacks (the LNK file will be blocked).
Others are vulnerable, except when security can block shortcuts or detect post-execution fileless techniques (like process hollowing):
Andy, are those who have WHHLight or Hard_Configurator installed protected against this type of exploit? But specifically LNK?
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
9,052
Andy, are those who have WHHLight or Hard_Configurator installed protected against this type of exploit? But specifically LNK?

Yes. However, those security-oriented apps are not intended for use in "automotive, entertainment, government, logistics, media, shipping, and technology sectors," often attacked by state-sponsored actors.
These possible targets should use EDRs like those mentioned in my previous post (and eventually Application Control for Business).
 
Last edited:

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
9,052
In October 2024, Microsoft changed the Windows loader mechanism in Windows 11 24H2. This prevents the typical Process Hollowing attack.
This is probably good news for many users, but not necessarily for Enterprises.

In widespread attacks, the typical Process Hollowing will still be prevalent for some time due to the popularity of Windows 10.
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top