ACRStealer, an information-stealing malware, used Google Docs for covert command and control communications. Legitimate platforms were used to facilitate the malware’s distribution, enabling the extraction of various confidential data. Among the sectors impacted is the U.S. defense, affecting over 500 employees across top defense and aerospace contractors, as well as hundreds of Army and Navy computers. Others used by ACRStealer included Steam and telegra.ph.

Novel Malware Leveraged In Salt Typhoon Attacks On US Telcos
Chinese state-backed threat group Salt Typhoon is compromising major US telecoms firms with its JumbledPath utility, used for network traffic monitoring and data extraction in