Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NANOREMOTE Malware Leverages  Google Drive API for Command-and-Control (C2) to Attack Windows Systems

NANOREMOTE Malware Leverages  Google Drive API for Command-and-Control (C2) to Attack Windows Systems

Posted on December 12, 2025December 12, 2025 By CWS

A classy new Home windows backdoor named NANOREMOTE emerged in October 2025, presenting a big menace to enterprise environments by leveraging respectable cloud infrastructure for malicious functions.

This fully-featured malware makes use of the Google Drive API as its major Command-and-Management (C2) channel, permitting menace actors to mix their malicious visitors seamlessly with regular community exercise.

By abusing trusted providers, NANOREMOTE bypasses conventional network-based detection mechanisms, enabling stealthy information exfiltration and payload staging.

The malware is written in C and shares vital code similarities with the beforehand recognized FINALDRAFT implant, suggesting a shared improvement lineage or a typical creator.

The an infection chain usually begins with a loader element often known as WMLOADER, which regularly masquerades as a respectable safety executable equivalent to Bitdefender’s BDReinit.exe to evade suspicion.

NANOREMOTE an infection chain (Supply – Elastic)

Upon execution, WMLOADER decrypts a payload file named wmsetup.log using an AES-CBC algorithm, subsequently launching the NANOREMOTE backdoor instantly into reminiscence.

This methodology minimizes the malware’s footprint on the disk, complicating forensic evaluation and stopping easy file-based detection signatures from working successfully.

Elastic Safety Labs safety analysts recognized that past its major C2 mechanism, NANOREMOTE incorporates superior evasion strategies equivalent to API hooking through the Microsoft Detours library to intercept course of termination calls.

This ensures the malware maintains persistence and resilience in opposition to crashes.

The implant additionally contains a customized PE loader derived from the libPeConv library, enabling it to load and execute extra executable modules instantly from disk or reminiscence with out counting on the usual Home windows loader. These options spotlight the sophistication of the menace.

Google Drive C2 Communication Structure

Essentially the most distinct characteristic of NANOREMOTE is its reliance on the Google Drive API for bidirectional communication.

The malware authenticates utilizing hard-coded OAuth 2.0 tokens, together with Consumer IDs and Refresh Tokens, saved in a pipe-separated configuration string.

Communications are secured through HTTPS and additional obfuscated utilizing Zlib compression and AES encryption.

The malware operates utilizing a polling mechanism the place it checks for queued duties, equivalent to file uploads or downloads, assigned by the operator.

The obtain from Google Drive illustrates how these requests seem on the community, mimicking respectable API calls. To facilitate these operations, NANOREMOTE makes use of particular command handlers.

For example, Handler 16 and Handler 17 are accountable for queuing obtain and add duties, respectively. The malware parses the JSON responses from the Google Drive API to execute directions.

WMLOADER File data (Supply – Elastic)

The Management move graph reveals command handlers; the malware dispatches duties based mostly on a swap assertion overlaying 22 distinct instructions.

Management move graph exhibiting command handlers (Supply – Elastic)

This construction permits the attackers to exactly management the sufferer machine, managing information and executing payloads whereas hiding inside encrypted visitors.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:API, Attack, CommandandControl, Drive, Google, Leverages, Malware, NANOREMOTE, Systems, Windows

Post navigation

Previous Post: Microsoft Bug Bounty Program Expanded to Third-Party Code
Next Post: New ConsentFix Attack Let Attackers Hijack Microsoft Accounts by Leveraging Azure CLI

Related Posts

United Natural Foods Suffers Cyberattack United Natural Foods Suffers Cyberattack Cyber Security News
UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device Cyber Security News
MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules Cyber Security News
Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks Cyber Security News
Threat Actors Compromise Xubuntu Website To Deliver Malicious Windows Executable Threat Actors Compromise Xubuntu Website To Deliver Malicious Windows Executable Cyber Security News
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News