• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
malware delivery via cloud services exploits unicode trick to deceive

Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users

You are here: Home / General Cyber Security News / Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users
May 21, 2024

A new attack marketing campaign dubbed CLOUD#REVERSER has been observed leveraging legit cloud storage solutions like Google Push and Dropbox to phase malicious payloads.

“The VBScript and PowerShell scripts in the CLOUD#REVERSER inherently includes command-and-management-like functions by applying Google Travel and Dropbox as staging platforms to control file uploads and downloads,” Securonix scientists Den Iuzvyk, Tim Peck, and Oleg Kolesnikov said in a report shared with The Hacker Information.

“The scripts are intended to fetch information that match certain patterns, suggesting they are waiting for commands or scripts placed in Google Drive or Dropbox.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The commencing place of the attack chain is a phishing email bearing a ZIP archive file, which is made up of an executable that masquerades as a Microsoft Excel file.

Cybersecurity

In an intriguing twist, the filename can make use of the concealed right-to-remaining override (RLO) Unicode character (U+202E) to reverse the order of the people that appear soon after that character in the string.

As a end result, the filename “RFQ-101432620247fl*U+202E*xslx.exe” is exhibited to the target as “RFQ-101432620247flexe.xlsx,” hence deceiving them into imagining that they are opening an Excel doc.

The executable is made to drop a total of 8 payloads, including a decoy Excel file (“20240416.xlsx”) and a seriously obfuscated Visual Primary (VB) Script (“3156.vbs”) which is liable for displaying the XLSX file to the person to manage the ruse and launch two other scripts named “i4703.vbs” and “i6050.vbs.”

Malware Delivery via Cloud Services

Both of those scripts are applied to set up persistence on the Windows host by means of a scheduled process by masquerading them as a Google Chrome browser update endeavor to stay clear of increasing purple flags. That reported, the scheduled jobs are orchestrated to operate two exclusive VB scripts referred to as “97468.tmp” and “68904.tmp” each moment.

Every single of these scripts, in convert, is employed to run two diverse PowerShell scripts “Tmp912.tmp” and “Tmp703.tmp,” which are made use of to hook up to an actor-controlled Dropbox and Google Travel account and obtain two much more PowerShell scripts referred to as “tmpdbx.ps1” and “zz.ps1”

The VB scripts are then configured to run the newly downloaded PowerShell scripts and fetch additional data files from the cloud expert services, including binaries that could be executed depending on the process policies.

“The late-phase PowerShell script zz.ps1 has features to download files from Google Generate based on certain requirements and preserve them to a specified route on the area program within the ProgramData listing,” the scientists stated.

The fact that the two the PowerShell scripts are downloaded on-the-fly indicates they could be modified by the threat actors at will to specify the documents that can be downloaded and executed on the compromised host.

Cybersecurity

Also downloaded by way of 68904.tmp is one more PowerShell script that’s able of downloading a compressed binary and functioning it specifically from memory in purchase to maintain network connection to the attacker’s command-and-regulate (C2) server.

The improvement is when all over again a signal that threat actors are significantly misusing respectable products and services to their benefit and fly under the radar.

“This technique follows a widespread thread wherever menace actors manage to infect and persist onto compromised devices while preserving to blend into normal background network sounds,” the scientists reported.

“By embedding malicious scripts in seemingly innocuous cloud platforms, the malware not only makes sure sustained obtain to qualified environments but also makes use of these platforms as conduits for information exfiltration and command execution.”

Identified this short article attention-grabbing? Adhere to us on Twitter  and LinkedIn to examine extra exclusive content we post.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «solarmarker malware evolves to resist takedown attempts with multi tiered infrastructure SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure
Next Post: Critical GitHub Enterprise Server Flaw Allows Authentication Bypass critical github enterprise server flaw allows authentication bypass»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.