Article Details
Scrape Timestamp (UTC): 2023-11-06 08:27:46.868
Source: https://thehackernews.com/2023/11/google-warns-of-hackers-absing-calendar.html
Original Article Text
Click to Toggle View
Google Warns of Hackers Absing Calendar Service as a Covert C2 Channel. Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit that leverages its Calendar service to host command-and-control (C2) infrastructure. The tool, called Google Calendar RAT (GCR), employs Google Calendar Events for C2 using a Gmail account. It was first published to GitHub in June 2023. "The script creates a 'Covert Channel' by exploiting the event descriptions in Google Calendar," according to its developer and researcher, who goes by the online alias MrSaighnal. "The target will connect directly to Google." The tech giant, in its eighth Threat Horizons report, said it has not observed the use of the tool in the wild, but noted its Mandiant threat intelligence unit has observed sharing the PoC on underground forums. "GCR, running on a compromised machine, periodically polls the Calendar event description for new commands, executes those commands on the target device, and then updates the event description with command output," Google said. The fact that the tool operates exclusively on legitimate infrastructure makes it difficult for defenders to detect suspicious activity, it added. The development highlights threat actors' continued interest in abusing cloud services to blend in with victim environments and fly under the radar. This includes an Iranian nation-state actor that was spotted employing macro-laced docs to compromise users with a small .NET backdoor codenamed BANANAMAIL for Windows that uses email for C2. "The backdoor uses IMAP to connect to an attacker-controlled webmail account where it parses emails for commands, executes them, and sends back an email containing the results," Google said. Google's Threat Analysis Group said it has since disabled the attacker-controlled Gmail accounts that were used by the malware as a conduit.
Daily Brief Summary
Google has issued a warning regarding threat actors using its Calendar service as a covert Command-and-Control (C2) cybersecurity infrastructure.
The public proof-of-concept (PoC) exploit, named Google Calendar RAT (GCR), operates through Google Calendar events using a Gmail account and was first published on GitHub In June 2023.
While Google has not yet detected the tool being utilized in real-world cybercrimes, its Mandiant threat intelligence unit has observed PoC sharing in underground online forums.
Operating purely on legitimate infrastructure, this novel exploit is difficult for defenders to detect due to its ability to blend with standard user activity.
Highlighting the exploitation of cloud services to infiltrate and compromise system environments, Google also flagged an Iranian nation-state actor utilizing macro-laced documents and a small .NET backdoor codename BANANAMAIL for malicious purposes.
Google's Threat Analysis Group has since moved to disable attacker-controlled Gmail accounts that were being leveraged by the malware.