Kaspersky Labs has reported that the cyber-espionage group Cloud Atlas, active since 2014, is targeting Eastern Europe and Central Asia with a sophisticated arsenal of new tools. The group’s latest campaign employs a recently identified backdoor known as VBCloud, designed for efficient data collection and exfiltration while maintaining stealth. VBCloud is deployed via VBShower, a loader that also introduces PowerShower a component used to scan local networks for further penetration. Once activated, VBCloud collects system information and extracts sensitive files for transmission to the attackers. Cloud Atlas relies heavily on phishing emails to initiate its attacks. These emails often contain malicious documents exploiting CVE-2018-0802, a vulnerability in Microsoft Equation Editor. When the victim opens the document, it triggers the download of an RTF file template from a remote server controlled by the attackers. This begins a multi-stage infection process, culminating in the installation of the VBShower and VBCloud backdoors. While this method has been in use since 2019, the group has made iterative improvements, focusing on enhancing the efficiency and effectiveness of their operations. VBShower functions as the primary loader, tasked with extracting and executing the VBCloud backdoor. VBCloud serves as the main tool for gathering system information, exfiltrating files, and maintaining communication with the command-and-control (C2) server. To obfuscate their operations, attackers use public cloud storage as their C2 server, complicating efforts to trace their activities. VBCloud also retrieves and decrypts additional payloads that run directly in memory, including PowerShell scripts used for reconnaissance, data harvesting, and brute-force attacks. The majority of Cloud Atlas victims approximately 82% are located in Russia, with others based in Belarus, Canada, Moldova, and Kyrgyzstan. The group’s use of tailored tools and techniques for each target complicates detection and analysis, emphasizing the need for organizations to bolster their cybersecurity measures and educate employees on recognizing and avoiding phishing attempts.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...