Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack

May 7, 2026

Legacy Security Tools Are Failing Data Protection

May 7, 2026

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

May 7, 2026
Facebook X (Twitter) Instagram
Friday, May 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»CloudZ Malware Abuses Phone Link to Steal SMS OTPs
News

CloudZ Malware Abuses Phone Link to Steal SMS OTPs

Team-CWDBy Team-CWDMay 6, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A Windows malware toolkit has been observed stealing SMS messages and one-time passwords (OTPs) from victim machines by hijacking Microsoft’s Phone Link application, sidestepping the need to directly compromise a target’s mobile device.

The activity has been ongoing since at least January 2026, according to new analysis from Cisco Talos researchers.

At the heart of the operation are a remote access tool (RAT) called CloudZ and a previously undocumented plugin named Pheno. The tools work together to harvest credentials and intercept authentication codes synced from a paired smartphone.

Phone Link as a Bridge to Mobile Data

Microsoft Phone Link, formerly known as Your Phone, is built into Windows 10 and 11 and mirrors smartphone notifications, SMS messages and call logs onto the desktop over Wi-Fi and Bluetooth.

Synchronized data is written to local SQLite database files on the PC, including one named PhoneExperiences-*.db. Cisco Talos said this design allowed attackers to capture mobile content from the endpoint without ever touching the phone.

The Pheno plugin continuously scans running processes for keywords associated with Phone Link, such as YourPhone, PhoneExperienceHost and Link to Windows.

When a match is found, it logs the process details to staging folders and then checks the output for the string “proxy”, which indicates the local relay used by an active Phone Link session.

If a live session is confirmed, Pheno tags the system as “Maybe connected”, flagging it for follow-on data collection by the operator.

Read more on SMS interception threats: New SMS Stealer Malware Targets Over 600 Global Brands

Memory-Resident Execution and Anti-Analysis

The observed infection chain began with the execution of a fake ScreenConnect update, the initial access vector for which remains unknown at the time of writing.

A Rust-compiled loader, using filenames such as systemupdates.exe, dropped a .NET loader disguised as a text file, which then deployed CloudZ via the legitimate regasm.exe binary. The latter was scheduled to run at system startup under the SYSTEM account.

CloudZ itself is a .NET executable obfuscated with ConfuserEx and compiled in mid-January 2026. Talos observed multiple anti-analysis layers, including timing-based sleep checks, enumeration of security tools such as Wireshark, Procmon and Sysmon and searches for virtual machine indicators in the system path and hostname.

The RAT pulls secondary configuration from attacker-controlled staging servers and Pastebin pages, rotates through three hardcoded user-agent strings to blend HTTP traffic with legitimate browser activity, and supports commands ranging from credential exfiltration to plugin loading and screen recording.

The technique shifts the risk surface for SMS-based multi-factor authentication (MFA) from the phone to the enterprise-managed Windows endpoint, undermining controls focused solely on mobile device security.

Cisco Talos has published indicators of compromise for the threat, along with ClamAV signatures, to help defenders detect and block the activity.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleChinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks
Next Article Five Years On: Lessons Learned From the Colonial Pipeline Cyber-Attack
Team-CWD
  • Website

Related Posts

News

Legacy Security Tools Are Failing Data Protection

May 7, 2026
News

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

May 7, 2026
News

Cline Kanban Flaw Lets Websites Hijack AI Coding Agents

May 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

AI-powered financial scams swamp social media

September 11, 2025

Here’s how to avoid a ‘second strike’

April 11, 2026

Watch out for SVG files booby-trapped with malware

September 22, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.