{"id":14342,"date":"2023-04-20T11:28:52","date_gmt":"2023-04-20T11:28:52","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=14342"},"modified":"2024-01-05T03:36:24","modified_gmt":"2024-01-05T03:36:24","slug":"google-command-and-control","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/google-command-and-control\/","title":{"rendered":"Chinese Hackers Use Google Command &#038; Control Capabilities in Attacks"},"content":{"rendered":"<p>Google experts have warned that the Chinese &#8220;government&#8221; hack group APT41 is abusing the red team&#8217;s GC2 (Google Command and Control) tool. According to experts, GC2 was used in attacks on Taiwanese media and an unnamed Italian recruiting company.<\/p>\n<p>Let me remind you that we also wrote that <a href=\"\/blogs\/backdoor-in-mimi-messenger\/\">Chinese Hackers Injected a Backdoor into the <strong>MiMi<\/strong> Messenger<\/a>, and more that <a href=\"\/blogs\/chinese-hackers-and-espionage\/\">Chinese Hackers Use Ransomware As a Cover for Espionage<\/a>.<\/p>\n<p>And also information security specialists reported that <a target=\"_blank\" href=\"https:\/\/adware.guru\/three-chinese-apt-groups-attack-major-telecommunications-companies\/\" rel=\"noopener nofollow\">Three Chinese APT Groups Attack Major Telecommunications Companies<\/a>.<\/p>\n<p>The <strong>Google Threat Analysis Group<\/strong> (TAG) <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/services.google.com\/fh\/files\/blogs\/gcat_threathorizons_full_apr2023.pdf\">links this campaign to the hacker group <strong>HOODOO<\/strong><\/a>, also known as <strong><a href=\"\/apt#APT41\">APT41<\/a><\/strong>, <strong>Barium<\/strong>, <strong>Bronze Atlas<\/strong>, <strong>Wicked Panda<\/strong> and <strong>Winnti<\/strong>. Typically, this grouping targets a wide range of industries in the US, Asia, and Europe.<\/p>\n<p>Google <strong>Command and Control<\/strong> is an open source project written in Go and developed specifically for the <strong>red team<\/strong>.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">This program is designed to provide management and control that does not require any specific configuration (eg custom domain, VPS, CDN, etc.) during red team operations. In addition, the program will only interact with Google domains (*.google.com) to make it harder to detect.<span class=\"su-quote-cite\"><a href=\"https:\/\/github.com\/looCiprian\/GC2-sheet\" target=\"_blank\" rel=\"nofollow noopener\">the description in the official project repository on <strong>GitHub<\/strong> says.<\/a><\/span><\/div><\/div>\n<p>Essentially, the project consists of an agent that is deployed to compromised devices and then connects to a Google Sheets URL to receive commands to execute. The received commands force the agent to download and install additional payloads from Google Drive or, on the contrary, steal data, \u201cuploading\u201d it to the cloud storage.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/04\/Attack-Workflow.jpg\" alt=\"Google Command and Control\" title=\"\"><\/p>\n<p>According to the TAG report, APT41 attacks start from phishing emails containing links to a password-protected file hosted on Google Drive. This file contains GC2, which penetrates the victim&#8217;s system.<\/p>\n<p>While it is not known what additional malware was distributed with GC2 this time around, APT41 typically deploys a wide range of malware on compromised systems. For example, a 2019 <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"http:\/\/www.mandiant.com\/sites\/default\/files\/2022-02\/rt-apt41-dual-operation.pdf\">report by <strong>Mandiant<\/strong><\/a> explained that attackers use rootkits, bootkits, custom malware, backdoors, PoS malware, and in some cases even ransomware in their campaigns.<\/p>\n<p>The researchers write that this find is notable for two reasons: first, it shows that Chinese hackers are increasingly relying on freely available and open-source tools to make attacks more difficult to attribute. Second, it points to the growing proliferation of malware and tools written in Go, which is popular with attackers due to its cross-platform and modular nature.<\/p>\n<p>Google also warned that &#8220;the undeniable importance of cloud services&#8221; has made them a profitable target for both &#8220;government&#8221; hackers and ordinary cybercriminals, who are increasingly using them &#8220;either as hosts for malware or as C2 infrastructure&#8221;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google experts have warned that the Chinese &#8220;government&#8221; hack group APT41 is abusing the red team&#8217;s GC2 (Google Command and Control) tool. According to experts, GC2 was used in attacks on Taiwanese media and an unnamed Italian recruiting company. Let me remind you that we also wrote that Chinese Hackers Injected a Backdoor into the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":14346,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[1529,274,58,29],"class_list":{"0":"post-14342","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-apt","9":"tag-chinese-hackers","10":"tag-google","11":"tag-hackers"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/04\/Google-Command-and-Control.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/14342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=14342"}],"version-history":[{"count":4,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/14342\/revisions"}],"predecessor-version":[{"id":18770,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/14342\/revisions\/18770"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/14346"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=14342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=14342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=14342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}