XStore Documentation

May 29, 2025 – Cyber Briefing

👉 What’s the latest in the cyber world today?

APT41 uses Google Calendar for malware C2, PumaBot brute-forces IoT devices, and NodeSnake RAT targets UK universities. Victoria’s Secret hit by breach, Cork loses $12M in DeFi exploit, and LexisNexis leaks data of 364K. UK invests £1B in cyber forces, Oregon bans geo data sales, and Horizon3.ai raises $100M to expand autonomous pentesting tools.

Listen to the full podcast


🚨 Cyber Alerts

1. APT41 Uses Google Calendar For C2 Operations

Google recently disclosed that Chinese state-sponsored threat actor APT41 utilized a malware named TOUGHPROGRESS, which creatively uses Google Calendar for command-and-control (C2). Discovered in late October 2024, this malware was hosted on a compromised government website and deployed via spear-phishing to target other government entities. The sophisticated attack chain involved a multi-stage payload with components like PLUSDROP and PLUSINJECT, leading to TOUGHPROGRESS interacting with Google Calendar events. Google has since neutralized the campaign by taking down the malicious calendars and associated projects and has notified the affected organizations.

2. New PumaBot IoT Botnet Uses SSH Attack

A new Go-based botnet named PumaBot is targeting embedded Linux IoT devices by conducting SSH brute-force attacks to expand and deliver further malware. Unlike typical botnets, PumaBot retrieves a specific list of target IPs from its command-and-control server and attempts to disguise itself as legitimate system files for persistence. Evidence like the “xmrig” command suggests a primary goal of illicit cryptocurrency mining, although the attackers may deploy other payloads, including sophisticated rootkits. This multi-stage threat also involves credential theft and demonstrates an intent to evade defenses, potentially enabling deeper network infiltration beyond simple DDoS attacks.

3. New NodeSnake RAT Hits UK Universities

The Interlock ransomware group is deploying a new JavaScript-based remote access trojan (RAT) called NodeSnake to gain persistent access to educational institutions’ networks. Researchers observed NodeSnake targeting UK universities in early 2025, with the malware showing signs of active development and using phishing for initial infection. NodeSnake employs various evasion techniques, including code obfuscation and disguised persistence mechanisms, while exfiltrating system data and allowing further payload deployment.

For more alerts, click here!

💥 Cyber Incidents

For more incidents, click here!

Click to See Tools

📢 Cyber News

For more news, click here

📈Cyber Stocks

On May 28, 2025, Zscaler fell 1.42%, CrowdStrike Holdings dropped 0.72%, Palo Alto Networks rose 1.04%, Fortinet declined 0.22%, and SentinelOne tumbled 11.39%.

💡 Cyber Tip

📚 Cyber Book

Click Here to Kill Everybody by Bruce Schneier

Click to Check Events

Copyright © 2025 CyberMaterial. All Rights Reserved.

Follow CyberMaterial on:

SubstackLinkedInTwitterRedditInstagramFacebookYouTube, and Medium.

Get Help

Online Scam Prevention & Recovery

Schedule a free consultation

A free 15-min cybersecurity consultation