Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code

Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code

Posted on December 19, 2025December 19, 2025 By CWS

The Cloud Atlas superior persistent risk group has continued its subtle marketing campaign focusing on organizations throughout Jap Europe and Central Asia in the course of the first half of 2025, leveraging outdated Microsoft Workplace vulnerabilities to ship a number of backdoor implants.

This marketing campaign reveals a coordinated effort to ascertain persistent entry and extract delicate knowledge from high-value targets.

Cloud Atlas, a recognized risk actor since 2014, has demonstrated persistent operational exercise by refining its assault methodology and increasing its toolkit.

The group’s infrastructure sometimes begins with phishing emails containing malicious paperwork that exploit CVE-2018-0802, a vulnerability within the Microsoft Workplace Equation Editor.

As soon as a sufferer opens the compromised file, a sequence of malware elements are downloaded and executed in a rigorously orchestrated an infection chain.

Malicious template with the exploit loaded by Phrase when opening the doc (Supply – Securelist)

Securelist analysts recognized that the an infection course of begins when customers open a Phrase doc containing a malicious template delivered from attacker-controlled servers.

The doc hundreds an RTF file that includes an exploit for the Equation Editor, which then downloads and executes an HTML Utility file.

This preliminary payload extracts a number of VBS recordsdata on the goal system, establishing the inspiration for deploying extra backdoors together with VBShower, PowerShower, VBCloud, and CloudAtlas. Every element serves particular capabilities throughout the total assault infrastructure.

The risk group’s arsenal demonstrates vital sophistication in evasion and persistence strategies.

The VBShower backdoor, which operates as the first launcher element, can execute downloaded VB scripts no matter file dimension, permitting operators to flexibly deploy numerous payloads.

Securelist researchers famous that the backdoor communicates with command servers to retrieve and execute extra scripts, together with specialised instruments designed for file exfiltration, system enumeration, and credential harvesting.

An infection Mechanism and Persistence Ways

The VBCloud implant represents a essential element in Cloud Atlas’s operational functionality. Working alongside a launcher script, VBCloud maintains encrypted communication with the command server by cloud-based infrastructure.

The launcher reads encrypted payload knowledge from native recordsdata, applies RC4 decryption with embedded keys, and executes the decrypted content material.

Malware execution move (Supply – Securelist)

Notably, this implementation makes use of the PRGA algorithm inside RC4, a technical alternative comparatively unusual in malware, suggesting the next stage of operational maturity.

The persistence mechanism incorporates Home windows Job Scheduler to keep up entry throughout system reboots.

The malware creates scheduled duties with names mimicking authentic system providers corresponding to “MicrosoftEdgeUpdateTask” and “MicrosoftVLCTaskMachine”.

These duties execute VBS scripts at common intervals, guaranteeing the malware stays operational even after system restarts.

File operations contain cautious use of the %Public% and %LOCALAPPDATA% directories, with the malware establishing hidden infrastructure by renamed recordsdata and encrypted payloads.

CloudAtlas, the final-stage backdoor, communicates by WebDAV protocols to cloud providers together with OpenDrive, establishing encrypted command channels that mix with authentic cloud site visitors.

The backdoor creates directories utilizing HTTP MKCOL strategies and retrieves payloads by PROPFIND requests.

Operators can deploy plugin modules for specialised capabilities, together with file grabbing, password stealing from browsers, and system info assortment.

The FileGrabber plugin targets paperwork with particular extensions corresponding to DOC, DOCX, XLS, XLSX, and PDF, whereas filtering recordsdata based mostly on dimension, modification date, and path exclusions.

The marketing campaign demonstrates focusing on of numerous sectors together with telecommunications, building, authorities entities, and industrial amenities all through Russia and Belarus.

Organizations face vital threat from this subtle risk group’s multi-staged an infection course of and highly effective post-exploitation capabilities.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Atlas, Cloud, Code, Execute, Exploiting, Group, Hacker, Malicious, Office, Vulnerabilities

Post navigation

Previous Post: Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility
Next Post: AI Security Firm Ciphero Emerges From Stealth With $2.5 Million in Funding

Related Posts

SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability Cyber Security News
Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Cyber Security News
A Milestone Powering Crypto’s Global Reach A Milestone Powering Crypto’s Global Reach Cyber Security News
CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks Cyber Security News
Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information Cyber Security News
New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark