Hackers have reportedly found a way to use the Google Calendar as command & control (C2) infrastructure which could create quite a few headaches in the cybersecurity community.

  • @Robin
    link
    English
    5411 months ago

    Do I understand correctly that this is not at all an exploit for Google Calendar itself, but just uses the Calendar share functionality to communicate to already infected hosts? That can be applied to pretty much any service with publicly accessible of sharable data though… I’d call this website out for clickbait but it seems like every tech news website is copy-pasting this same fearmongering article.

    • @[email protected]
      link
      fedilink
      English
      2211 months ago

      I’m actually surprised that this wasn’t seen before. It’s a domain that can’t be blocked in lots of companies, and frequent requests to it won’t raise any flags in any company that uses Google Workspace.

      • Deconceptualist
        link
        fedilink
        English
        12
        edit-2
        11 months ago

        Yep, this. A couple years ago, Google Drive sharing was used in a loosely similar way to deliver malware, and Google had to build some new controls. I’m surprised it took the baddies this long to exploit GCal.

        • 108
          link
          fedilink
          1311 months ago

          Or they have been doing it quietly all along

    • Goronmon
      link
      fedilink
      711 months ago

      I don’t know, I’m really interested in all these internet services that are 100% safe from hackers. Sounds like very useful information that should be shared around.