Google Warns How Hackers Could Abuse Calendar Service as a Covert C2 Channel,
Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit that leverages its Calendar service to host command-and-control (C2) infrastructure.
The tool, called Google Calendar RAT (GCR), employs Google Calendar Events for C2 using a Gmail account. It was first published to GitHub in June 2023.
« The script creates a ‘Covert Channel’ by exploiting the event
The tool, called Google Calendar RAT (GCR), employs Google Calendar Events for C2 using a Gmail account. It was first published to GitHub in June 2023.
« The script creates a ‘Covert Channel’ by exploiting the event
,
Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit that leverages its Calendar service to host command-and-control (C2) infrastructure.
The tool, called Google Calendar RAT (GCR), employs Google Calendar Events for C2 using a Gmail account. It was first published to GitHub in June 2023.
« The script creates a ‘Covert Channel’ by exploiting the event
The tool, called Google Calendar RAT (GCR), employs Google Calendar Events for C2 using a Gmail account. It was first published to GitHub in June 2023.
« The script creates a ‘Covert Channel’ by exploiting the event
, ,
https://thehackernews.com/2023/11/google-warns-of-hackers-absing-calendar.html