Security News > 2019 > January > New malware found using Google Drive as its command-and-control server

2019-01-21 15:48
Since most security tools also keep an eye on the network traffic to detect malicious IP addresses, attackers are increasingly adopting infrastructure of legitimate services in their attacks to hide their malicious activities. Cybersecurity researchers have now spotted a new malware attack campaign linked to the notorious DarkHydrus APT group that uses Google Drive as its command-and-control (
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/Hok7n-hRYic/macro-malware-microsoft-office.html
Related news
- Police detains Smokeloader malware customers, seizes servers (source)
- Google links new LostKeys data theft malware to Russian cyberspies (source)
- APT41 malware abuses Google Calendar for stealthy C2 communication (source)
- Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations (source)