Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code

Posted on December 19, 2025December 19, 2025 By CWS

The Cloud Atlas superior persistent risk group has continued its subtle marketing campaign focusing on organizations throughout Jap Europe and Central Asia in the course of the first half of 2025, leveraging outdated Microsoft Workplace vulnerabilities to ship a number of backdoor implants.

This marketing campaign reveals a coordinated effort to ascertain persistent entry and extract delicate knowledge from high-value targets.

Cloud Atlas, a recognized risk actor since 2014, has demonstrated persistent operational exercise by refining its assault methodology and increasing its toolkit.

The group’s infrastructure sometimes begins with phishing emails containing malicious paperwork that exploit CVE-2018-0802, a vulnerability within the Microsoft Workplace Equation Editor.

As soon as a sufferer opens the compromised file, a sequence of malware elements are downloaded and executed in a rigorously orchestrated an infection chain.

Malicious template with the exploit loaded by Phrase when opening the doc (Supply – Securelist)

Securelist analysts recognized that the an infection course of begins when customers open a Phrase doc containing a malicious template delivered from attacker-controlled servers.

The doc hundreds an RTF file that includes an exploit for the Equation Editor, which then downloads and executes an HTML Utility file.

This preliminary payload extracts a number of VBS recordsdata on the goal system, establishing the inspiration for deploying extra backdoors together with VBShower, PowerShower, VBCloud, and CloudAtlas. Every element serves particular capabilities throughout the total assault infrastructure.

The risk group’s arsenal demonstrates vital sophistication in evasion and persistence strategies.

The VBShower backdoor, which operates as the first launcher element, can execute downloaded VB scripts no matter file dimension, permitting operators to flexibly deploy numerous payloads.

Securelist researchers famous that the backdoor communicates with command servers to retrieve and execute extra scripts, together with specialised instruments designed for file exfiltration, system enumeration, and credential harvesting.

An infection Mechanism and Persistence Ways

The VBCloud implant represents a essential element in Cloud Atlas’s operational functionality. Working alongside a launcher script, VBCloud maintains encrypted communication with the command server by cloud-based infrastructure.

The launcher reads encrypted payload knowledge from native recordsdata, applies RC4 decryption with embedded keys, and executes the decrypted content material.

Malware execution move (Supply – Securelist)

Notably, this implementation makes use of the PRGA algorithm inside RC4, a technical alternative comparatively unusual in malware, suggesting the next stage of operational maturity.

The persistence mechanism incorporates Home windows Job Scheduler to keep up entry throughout system reboots.

The malware creates scheduled duties with names mimicking authentic system providers corresponding to “MicrosoftEdgeUpdateTask” and “MicrosoftVLCTaskMachine”.

These duties execute VBS scripts at common intervals, guaranteeing the malware stays operational even after system restarts.

File operations contain cautious use of the %Public% and %LOCALAPPDATA% directories, with the malware establishing hidden infrastructure by renamed recordsdata and encrypted payloads.

CloudAtlas, the final-stage backdoor, communicates by WebDAV protocols to cloud providers together with OpenDrive, establishing encrypted command channels that mix with authentic cloud site visitors.

The backdoor creates directories utilizing HTTP MKCOL strategies and retrieves payloads by PROPFIND requests.

Operators can deploy plugin modules for specialised capabilities, together with file grabbing, password stealing from browsers, and system info assortment.

The FileGrabber plugin targets paperwork with particular extensions corresponding to DOC, DOCX, XLS, XLSX, and PDF, whereas filtering recordsdata based mostly on dimension, modification date, and path exclusions.

The marketing campaign demonstrates focusing on of numerous sectors together with telecommunications, building, authorities entities, and industrial amenities all through Russia and Belarus.

Organizations face vital threat from this subtle risk group’s multi-staged an infection course of and highly effective post-exploitation capabilities.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Atlas, Cloud, Code, Execute, Exploiting, Group, Hacker, Malicious, Office, Vulnerabilities

Post navigation

Previous Post: Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility
Next Post: AI Security Firm Ciphero Emerges From Stealth With $2.5 Million in Funding

Related Posts

LangChainGo Vulnerability Let Attackers Access Sensitive Files Cyber Security News
Threat Actors Leveraging compromised RDP Logins to Deploy Lynx Ransomware After Deleting Server Backups Cyber Security News
Weaponized PyPI Package Steals Solana Private Keys Via Supply Chain Attack Cyber Security News
Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System Cyber Security News
Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight Cyber Security News
Indian Authorities Dismantled Cybercriminals That Impersonate as Microsoft Tech Support Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee
  • Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security Deal
  • Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
  • AI Security Firm Ciphero Emerges From Stealth With $2.5 Million in Funding
  • Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee
  • Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security Deal
  • Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
  • AI Security Firm Ciphero Emerges From Stealth With $2.5 Million in Funding
  • Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark