en

Dangerous Calendar: A New Tool for Phishing Attacks

Dangerous Calendar: A New Tool for Phishing Attacks
Datami Newsroom
Datami Newsroom Datami Newsroom
Sep 2, 2025 3 min

Did you know that a regular calendar can be used as a tool in a hacker attack? Google researchers discovered that the Chinese hacker group APT41 (also known as HOODOO) used Google Calendar to deliver commands to infected devices.

In October 2024, Google’s Threat Intelligence Group (GTIG) uncovered a phishing campaign in which a compromised government website was spreading ZIP archives containing hidden files. These files launched the malware known as TOUGHPROGRESS, which, once installed, would read specially crafted events in Google Calendar. The event descriptions contained encrypted instructions - this is how the hackers controlled the attacks.

Together with experts from Mandiant FLARE, Google was able to decrypt the code and identify patterns in such events. After that:

      • related Google Workspace projects were blocked,
      • affected organizations were notified,
      • and additional security measures were implemented.

APT41 has been active since 2012, primarily targeting the healthcare, telecommunications, and technology sectors. The group has carried out attacks in over 14 countries and has used dozens of different malicious tools.

This case shows that even everyday workplace tools, such as calendars, can

Security breach warning and phishing events in Google

be used in cyberattacks. That’s why it’s crucial for companies to focus on:

      • monitoring suspicious calendar activity,
      • updating security systems,
      • and educating employees on cybersecurity hygiene.

Cybersecurity is not optional - it’s a necessary condition for stable business operations.

free_consultation

Fill out the form below, and we’ll get in touch with you right away to discuss a plan to protect your business!

Updated: 03.09.2025
(0 assessments, average 0/5.0)

Related content

TOP 5 Largest Cryptocurrency Hacks in History Datami Newsroom
Datami Newsroom

TOP 5 Largest Cryptocurrency Hacks in History

The cryptocurrency industry is still in its formative stage, and its highly complex technologies are not always adequately protected. In addition, inexperienced users often make serious mistakes in securing their assets. This creates various opportunities

Jun 3, 2025 4 min
Datami at the Barcelona Cybersecurity Congress 2025: New Horizons in Cybersecurity Datami Newsroom
Datami Newsroom

Datami at the Barcelona Cybersecurity Congress 2025: New Horizons in Cybersecurity

Datami took part in the Barcelona Cybersecurity Congress 2025, one of Europe’s key events dedicated to cybersecurity innovations and technologies.

Jun 3, 2025
Top 10 Cyberattacks That Brought Global Corporations to a Halt Datami Newsroom
Datami Newsroom

Top 10 Cyberattacks That Brought Global Corporations to a Halt

Cyberattacks today pose a serious threat not only to individual users but also to global corporations. Criminals use increasingly sophisticated methods, causing companies billions in losses and disrupting the operation of critical systems.

Jun 17, 2025 3 min
Antivirus Is Not a Shield: Why You Can’t Do Without Pentesting Datami Newsroom
Datami Newsroom

Antivirus Is Not a Shield: Why You Can’t Do Without Pentesting

Among companies, there is a common belief that installing antivirus software provides a sufficient level of security. This stems from the popularity of antivirus solutions, which are an important part of protection, but do not cover all threats.

Jun 23, 2025 3 min
Over 480,000 Catholic Health Patients Affected by Personal Data Breach Datami Newsroom
Datami Newsroom

Over 480,000 Catholic Health Patients Affected by Personal Data Breach

The Catholic Health network, which provides medical services to residents of Western New York (USA), has reported a major data breach. As a result, confidential information about 483,000 patients was exposed and became publicly accessible on the internet.

Jun 3, 2025 3 min
Why Your Smartphone Is at Risk: 5 Common Myths About Mobile Security Datami Newsroom
Datami Newsroom

Why Your Smartphone Is at Risk: 5 Common Myths About Mobile Security

Most of us take careful care of our smartphones, protecting them from scratches, drops, or other physical damage. But when it comes to digital security, many people ignore potential threats. Cybercriminals eagerly take advantage of this negligence...

Jun 3, 2025 5 min
Back to home page
Order a free consultation
We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy