{"id":51508,"date":"2023-04-18T17:58:00","date_gmt":"2023-04-18T17:58:00","guid":{"rendered":"https:\/\/www.darkreading.com\/vulnerabilities-threats\/apt41-taps-google-red-teaming-tool-targeted-info-stealing-attacks"},"modified":"2023-04-18T17:58:00","modified_gmt":"2023-04-18T17:58:00","slug":"apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/","title":{"rendered":"APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b0b1c27d52b4578\/62b4ba5e9b1d980db353fdce\/chinaiptheft_Pixels_Hunter_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The advanced persistent threat known as APT41 has pressed into service an open source, red-teaming tool, Google Command and Control (GC2), for use in cyber espionage attacks marking a shift in its tactics.<\/p>\n<p>According to the Google Threat Analysis Group (TAG) team, the APT41 group, also known as HOODOO, <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/china-winnti-apt-trade-secrets-us\" target=\"_blank\" rel=\"noopener\">Winnti,<\/a> and Bronze Atlas, recently targeted a Taiwanese media organization with phishing emails which contained links to a password protected file hosted in Drive.<\/p>\n<p>When the file was opened, it fetched the GC2 payload. As detailed in the <a href=\"https:\/\/services.google.com\/fh\/files\/blogs\/gcat_threathorizons_full_apr2023.pdf\" target=\"_blank\" rel=\"noopener\">TAG April Threat Horizons report<\/a>, this tool gets its commands from Google Sheets, most likely to hide the malicious activity, and exfiltrates data to Google Drive. The GC2 tool also enables the attacker to download additional files from Drive on to the victim&#8217;s system.<\/p>\n<p>APT41 also previously used GC2 last July to target an Italian job search website, according to TAG.<\/p>\n<p>TAG researchers noted that incidents such as this highlight several trends by China-affiliated threat actors, such as using publicly available tooling, the proliferation of tools written in the <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/cross-platform-ransomware-spikes-problem\" target=\"_blank\" rel=\"noopener\">Go programming language<\/a>, and the targeting of Taiwanese media.<\/p>\n<h2 class=\"regular-text\">Using Publicly Available Tools<\/h2>\n<p>Chinese APT groups have increasingly used publicly available (and legitimate) tools such as Cobalt Strike and other penetration testing software, which is available on sites like GitHub; there&#8217;s also been a shift to using lesser-known red teaming tools such as <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/cyber-campaign-cobalt-strike-pentest-tool-brute-ratel\" target=\"_blank\" rel=\"noopener\">Brute Ratel<\/a> and Sliver to evade detection during their attacks.<\/p>\n<p>The use of such &#8220;living off the land&#8221; tactics is well known in financially motivated cyberattackers, but less so among APTs that are better resourced and can develop custom tools. Yet Christopher Porter, head of threat intelligence for Google Cloud, said in the report that it is &#8220;only prudent to consider that state-sponsored cyber threat actors may steal from the playbooks of cybercriminals to target such systems.&#8221;<\/p>\n<p>He adds, &#8220;A familiar domain name disarms many of the natural defenses we all have when viewing a suspicious email, and the degree to which it is trusted will often be hard coded into security systems screening for spam or malware,\u201d he says. He also flagged the use of cloud services for stealth and legitimacy: &#8220;Cloud providers are useful targets for these kinds of operations, either as hosts for malware or providing the infrastructure for command-and-control.&#8221;<\/p>\n<h2 class=\"regular-text\">Who Is APT41?<\/h2>\n<p>The group&#8217;s activities illustrate the &#8220;continued overlap of public sector threat actors targeting private sector organizations with limited government ties,&#8221; according to the TAG analysis.<\/p>\n<p>Last year the same group was <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/china-linked-cyber-espionage-team-homes-in-on-hong-kong-government-orgs\" target=\"_blank\" rel=\"noopener\">discovered deploying the Spyder Loader malware<\/a> as part of an ongoing campaign to gather intelligence information on government organizations in Hong Kong, as well as <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/log4j-and-livestock-apps-apt41-wages-persistent-cyberattack-campaign-on-us-government\" target=\"_blank\" rel=\"noopener\">targeting multiple US government agencies<\/a> using the Log4j vulnerability.<\/p>\n<p><a href=\"https:\/\/www.secureworks.com\/research\/threat-profiles\/bronze-atlas\" target=\"_blank\" rel=\"noopener\">Bronze Atlas<\/a> is &#8220;one of the most prolific groups we have been tracking for a long time,&#8221; says Marc Burnard, senior security researcher for Secureworks&#8217;&nbsp;Counter Threat Unit, having tracked it since at least 2007. And during that time, the group &#8220;has&nbsp;been very prolific,&#8221; he says.<\/p>\n<p>Burnard says APT41 has gone after a range of targets, including government, healthcare, high-tech manufacturing, telcos, aviation, non-governmental organizations (NGOs), and targets in line with China&#8217;s political and economic interests.<\/p>\n<p>&#8220;They are primarily focused on stealing intellectual property, and they have also been involved in targeting political intelligence as well,&#8221; he notes.<\/p>\n<p>Asked why this particular Taiwanese media company would be targeted, Burnard admits there could be several reasons, including the China-Taiwan political situation, a goal of using the victim to target other organizations and individuals, or there could be a &#8220;destructive element&#8221; too.<\/p>\n<h2 class=\"regular-text\">APT41 Quiets Down Its Wall of Noise<\/h2>\n<p>As mentioned, the TAG report found that the attackers sent phishing emails to the victim containing links to legitimate cloud services in order to avoid detection \u2014 links to a <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/cyberattackers-spoof-google-translate-unique-phishing-tactic\" target=\"_blank\" rel=\"noopener\">trusted cloud service<\/a> don&#8217;t set off email filters. Burnard points out that this is part of a style change for the group, as up until the last few years it was quite noisy in its attacks, and not too worried about the activity being detected.<\/p>\n<p>However, since the 2020 <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/us-charges-five-members-of-china-linked-apt41-for-global-attacks\" target=\"_blank\" rel=\"noopener\">indictment of seven alleged cybercriminals<\/a>, which reportedly included members of APT41, the activity has been more stealthy and Burnard says the APT is now moving towards using legitimate tools like Cobalt Strike, and towards cloud services, to hide their intent and activity.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/apt41-taps-google-red-teaming-tool-targeted-info-stealing-attacks\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>China-linked APT41 group targeted a Taiwanese media organization and an Italian job agency with standard, open source penetration test tools, in a change in strategy.Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/apt41-taps-google-red-teaming-tool-targeted-info-stealing-attacks\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51508","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-18T17:58:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b0b1c27d52b4578\/62b4ba5e9b1d980db353fdce\/chinaiptheft_Pixels_Hunter_shutterstock.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks\",\"datePublished\":\"2023-04-18T17:58:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/\"},\"wordCount\":737,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7b0b1c27d52b4578\\\/62b4ba5e9b1d980db353fdce\\\/chinaiptheft_Pixels_Hunter_shutterstock.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/\",\"name\":\"APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7b0b1c27d52b4578\\\/62b4ba5e9b1d980db353fdce\\\/chinaiptheft_Pixels_Hunter_shutterstock.jpg\",\"datePublished\":\"2023-04-18T17:58:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7b0b1c27d52b4578\\\/62b4ba5e9b1d980db353fdce\\\/chinaiptheft_Pixels_Hunter_shutterstock.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7b0b1c27d52b4578\\\/62b4ba5e9b1d980db353fdce\\\/chinaiptheft_Pixels_Hunter_shutterstock.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/","og_locale":"en_US","og_type":"article","og_title":"APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-18T17:58:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b0b1c27d52b4578\/62b4ba5e9b1d980db353fdce\/chinaiptheft_Pixels_Hunter_shutterstock.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks","datePublished":"2023-04-18T17:58:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/"},"wordCount":737,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b0b1c27d52b4578\/62b4ba5e9b1d980db353fdce\/chinaiptheft_Pixels_Hunter_shutterstock.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/","name":"APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b0b1c27d52b4578\/62b4ba5e9b1d980db353fdce\/chinaiptheft_Pixels_Hunter_shutterstock.jpg","datePublished":"2023-04-18T17:58:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b0b1c27d52b4578\/62b4ba5e9b1d980db353fdce\/chinaiptheft_Pixels_Hunter_shutterstock.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b0b1c27d52b4578\/62b4ba5e9b1d980db353fdce\/chinaiptheft_Pixels_Hunter_shutterstock.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apt41-taps-google-red-teaming-tool-in-targeted-info-stealing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51508"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51508\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}