Malware that uses Google Docs to communicate with attackers in order to hide the malicious traffic. The malware uses the Google Drive Viewer as a proxy for receiving instructions from the real command and control server. Researchers say the malware is distributed with the help of Rich Text Format (RTF) or Microsoft Word documents, but does not exploit any vulnerability to install its malicious components. It can execute commands received from the attacker’s C&C server and can steal information from infected computers. Google says using any Google product to conduct this kind of activity is a violation of product policies.”]

