![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoVLIzCHPGRjxtC7_Lx_ignvAdE98aK31IRPAvurrwihgcsNAw44DhfWUhF5Dyor0x1c9vhymA9vnF21ehqsCjIHYQQ8QkhClpP969G2miAKyUqB_KpFLARxZpNHuvciuSrC_0GRiMSL6QUV6sAh32Tddk1oqK3ie_6hHtXOZAOoG9xBv3lB6PXeigomuy/s1600/google.jpg)
Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit that leverages its Calendar service to host command-and-control (C2) infrastructure.
The tool, called Google Calendar RAT (GCR), employs Google Calendar Events for C2 using a Gmail account. It was first published to GitHub in June 2023.
“The script creates a ‘Covert Channel’ by exploiting the event
Source:: The Hackers News