paint-brush
How Hackers Host C2 Servers on Google Infrastructure (Google Sheets & Drive)by@grantcollins
1,397 reads
1,397 reads

How Hackers Host C2 Servers on Google Infrastructure (Google Sheets & Drive)

by Grant CollinsMay 15th, 2023
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Reading through my weekly security news and stumbled on a Bleepingcomputer article about using Google Workspace's Drive and Sheets (formerly G-Suite) to communicate and exfiltrate information natively Drive and Sheets. I thought this was a clever project because: You do not have to set up any particular domains, servers as most C2 frameworks do. (And many defense tools maintain a dynamic list of  malicious domains, IPs, etc). This doesn't use common C2 and red team frameworks, such as Cobalt Strike, SilverC2, or Brute Ratel. This program and traffic only interact with Google's domains (*.google.com) to make detection more difficult for tools.
featured image - How Hackers Host C2 Servers on Google Infrastructure (Google Sheets & Drive)
Grant Collins HackerNoon profile picture


Reading through my weekly security news and stumbled on a Bleepingcomputer article about using Google Workspace's Drive and Sheets (formerly G-Suite) to communicate and exfiltrate information natively Drive and Sheets.


Disclaimer: Please note this article and its contents are for educational purposes only. By explaining tactics used by hackers, I hope only to further enable security professionals to better protect themselves and their companies.


I thought this was a clever project because:

  • You do not have to set up any particular domains, servers as most C2 frameworks do. (And many defense tools maintain a dynamic list of  malicious domains, IPs, etc).


  • This doesn't use common C2 and red team frameworks, such as Cobalt Strike, SilverC2, or Brute Ratel.


  • This program and traffic only interact with Google's domains (*.google.com) to make detection more difficult for tools.


A caveat: A smart EDR tool would be able to identify the malicious commands being executed.

In this small video, I will be setting up this project and testing the viability of this project, which basically means me pulling this repository and typing commands.


You are welcome to follow along with the video tutorial if you would like.


I will be using a rudimentary Ubuntu 20.04 host on Digital Ocean as a simulation of my victim machine.


NOTE that this would be an executable the attacker would deploy on a machine post compromise.


And even though there are caveats, as there often are, the recent use of GC2 by APT41 which is a suspected Chinese state-sponsored hacking group means this tool is being used out in the wild.


Take a look at the video for more information on my experience.


What did you think of this guide? Let me know your questions in the comments below.


This article was part of HackerNoon’s YouTuber series where we share the best tech content that YouTube has to offer.


If you want to see more from this series, check it out here.