JAKARTA Hackers are now finding ways to spread crime through Google Calendar. Reportedly, they managed to turn this Google default application into a Command and Control (C2) tool.
C2 is an important infrastructure that hackers use in operating their crimes. C2 is needed so they can infiltratemalware and carry out orders as they wish.
According to Techradar, if C2 infrastructure manages to take advantage of the well-known platform thatGooglebawa has, then security experts at the company will find it difficult to detect attacks and end their connections.
Google is aware of this problem. They provide warnings in the security community that exploitation of concept evidence (Poc) or attacks on computers and networks is widely circulated on dark websites.
SEE ALSO:
This PoC is dubbed the Google Calendar RAT (GCR). When using GCR, hackers only need to use a Gmail account and their script will create a covert channel by utilizing the description of the event on Google Kalendar.
When your device is infected with GCR, the device will do a patterning on the calendar description to create new commands and run the device. After that, the description of the event will be updated again until a new command appears.
So far, there have been no serious reports of hacking using GCR. However, we need to worry about the success of this hacker. If you get to the app developed by Google, bad things can happen.
The English, Chinese, Japanese, Arabic, and French versions are automatically generated by the AI. So there may still be inaccuracies in translating, please always see Indonesian as our main language. (system supported by DigitalSiber.id)