Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users
A new cyberattack campaign dubbed CLOUD#REVERSER has been identified leveraging legitimate cloud storage services like Google Drive and Dropbox to distribute malicious payloads.
According to Securonix researchers Den Iuzvyk, Tim Peck, and Oleg Kolesnikov, the campaign utilizes VBScript and PowerShell scripts to execute command-and-control-like activities, using cloud platforms as staging areas for managing file uploads and downloads. These scripts are designed to fetch files matching specific patterns, indicating they await commands or scripts placed in Google Drive or Dropbox.
The attack begins with a phishing email containing a ZIP archive file, which houses an executable masquerading as a Microsoft Excel document. The filename employs a hidden right-to-left override (RLO) Unicode character (U+202E) to reverse the order of subsequent characters, making "RFQ-101432620247flU+202Exslx.exe" appear as "RFQ-101432620247flexe.xlsx," thereby deceiving the victim into opening what they believe is an Excel file.
Upon execution, the file drops eight payloads, including a decoy Excel file and an obfuscated Visual Basic Script designed to maintain the illusion of an Excel document while launching two other scripts for further malicious activities. These scripts establish persistence on the host machine by creating scheduled tasks disguised as Google Chrome browser updates.
The scheduled tasks execute two unique VB scripts every minute, which in turn run PowerShell scripts that connect to Dropbox and Google Drive to download additional scripts and binaries. These late-stage PowerShell scripts, capable of downloading and executing files based on specific criteria, are dynamically modified by threat actors to control the compromised system.
One particular PowerShell script retrieved by the malware can run a compressed binary directly from memory, ensuring a continuous connection to the attacker’s command-and-control server. This technique enables the malware to blend into regular background network traffic, making detection challenging.
This campaign underscores a growing trend where threat actors misuse legitimate services to avoid detection. By embedding malicious scripts within reputable cloud platforms, the malware ensures sustained access to targeted environments and uses these platforms for data exfiltration and command execution.
As the investigation continues, the full scope of the campaign and its targets remain unclear. However, this development highlights the importance of vigilance and robust cybersecurity measures to defend against sophisticated malware delivery methods exploiting trusted cloud services.
- Other (42)
- Ransomware (123)
- Events and News (26)
- Features (44)
- Security (422)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (187)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (4)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)