Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

NANOREMOTE Malware Leverages  Google Drive API for Command-and-Control (C2) to Attack Windows Systems

Posted on December 12, 2025December 12, 2025 By CWS

A classy new Home windows backdoor named NANOREMOTE emerged in October 2025, presenting a big menace to enterprise environments by leveraging respectable cloud infrastructure for malicious functions.

This fully-featured malware makes use of the Google Drive API as its major Command-and-Management (C2) channel, permitting menace actors to mix their malicious visitors seamlessly with regular community exercise.

By abusing trusted providers, NANOREMOTE bypasses conventional network-based detection mechanisms, enabling stealthy information exfiltration and payload staging.

The malware is written in C and shares vital code similarities with the beforehand recognized FINALDRAFT implant, suggesting a shared improvement lineage or a typical creator.

The an infection chain usually begins with a loader element often known as WMLOADER, which regularly masquerades as a respectable safety executable equivalent to Bitdefender’s BDReinit.exe to evade suspicion.

NANOREMOTE an infection chain (Supply – Elastic)

Upon execution, WMLOADER decrypts a payload file named wmsetup.log using an AES-CBC algorithm, subsequently launching the NANOREMOTE backdoor instantly into reminiscence.

This methodology minimizes the malware’s footprint on the disk, complicating forensic evaluation and stopping easy file-based detection signatures from working successfully.

Elastic Safety Labs safety analysts recognized that past its major C2 mechanism, NANOREMOTE incorporates superior evasion strategies equivalent to API hooking through the Microsoft Detours library to intercept course of termination calls.

This ensures the malware maintains persistence and resilience in opposition to crashes.

The implant additionally contains a customized PE loader derived from the libPeConv library, enabling it to load and execute extra executable modules instantly from disk or reminiscence with out counting on the usual Home windows loader. These options spotlight the sophistication of the menace.

Google Drive C2 Communication Structure

Essentially the most distinct characteristic of NANOREMOTE is its reliance on the Google Drive API for bidirectional communication.

The malware authenticates utilizing hard-coded OAuth 2.0 tokens, together with Consumer IDs and Refresh Tokens, saved in a pipe-separated configuration string.

Communications are secured through HTTPS and additional obfuscated utilizing Zlib compression and AES encryption.

The malware operates utilizing a polling mechanism the place it checks for queued duties, equivalent to file uploads or downloads, assigned by the operator.

The obtain from Google Drive illustrates how these requests seem on the community, mimicking respectable API calls. To facilitate these operations, NANOREMOTE makes use of particular command handlers.

For example, Handler 16 and Handler 17 are accountable for queuing obtain and add duties, respectively. The malware parses the JSON responses from the Google Drive API to execute directions.

WMLOADER File data (Supply – Elastic)

The Management move graph reveals command handlers; the malware dispatches duties based mostly on a swap assertion overlaying 22 distinct instructions.

Management move graph exhibiting command handlers (Supply – Elastic)

This construction permits the attackers to exactly management the sufferer machine, managing information and executing payloads whereas hiding inside encrypted visitors.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:API, Attack, CommandandControl, Drive, Google, Leverages, Malware, NANOREMOTE, Systems, Windows

Post navigation

Previous Post: Microsoft Bug Bounty Program Expanded to Third-Party Code
Next Post: New ConsentFix Attack Let Attackers Hijack Microsoft Accounts by Leveraging Azure CLI

Related Posts

Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence Cyber Security News
New Quishing Attack With Weaponized QR Code Targeting Microsoft Users Cyber Security News
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack Cyber Security News
Qilin Ransomware Leveraging Mspaint and Notepad to Find Files with Sensitive Information Cyber Security News
ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data Cyber Security News
Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Ivanti Patches Exploited EPMM Zero-Days
  • Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
  • Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads
  • SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Ivanti Patches Exploited EPMM Zero-Days
  • Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
  • Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads
  • SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark