Attackers Exploit Microsoft Phone Link with CloudZ RAT to Intercept Mobile SMS and OTPs

Cybersecurity researchers have uncovered a sophisticated cyberattack leveraging Microsoft’s Phone Link application to intercept sensitive mobile communications. The attack employs a Remote Access Trojan (RAT) named CloudZ, in conjunction with a custom plugin called Pheno, to clandestinely access SMS messages and one-time passwords (OTPs) from users’ smartphones without direct interaction with the mobile devices.

Understanding the Attack Mechanism

The Microsoft Phone Link application is designed to bridge Windows PCs and Android smartphones, enabling users to manage calls, messages, and notifications from their computers. This integration, while convenient, has been exploited by attackers to access data transmitted between the paired devices.

The attack initiates with the distribution of a counterfeit update for a remote support tool known as ScreenConnect. Unsuspecting users who execute this fake update inadvertently install a .NET loader, which subsequently deploys the CloudZ RAT. Once active, CloudZ provides attackers with comprehensive control over the compromised system, facilitating the extraction of browser data and the activation of the Pheno plugin.

Technical Execution and Evasion Tactics

CloudZ is engineered with advanced evasion techniques to avoid detection. It monitors for analysis tools such as Wireshark, Fiddler, Procmon, and Sysmon, and generates critical functions dynamically in memory, complicating efforts to analyze or reverse-engineer the malware.

The Pheno plugin plays a pivotal role by scanning active processes for identifiers associated with the Phone Link application, including YourPhone, PhoneExperienceHost, and Link to Windows. Upon identifying these processes, Pheno logs pertinent details to a staging file named after the victim’s computer.

Pheno then searches this file for the term proxy, indicating an active connection between the PC and the smartphone. If such a connection is detected, the plugin records Maybe connected in its output file, signaling to CloudZ that conditions are favorable for intercepting mobile data.

Subsequently, CloudZ accesses the Phone Link application’s local SQLite database, PhoneExperiences-.db, which stores synchronized SMS messages, call logs, and app notifications. This database may contain OTPs sent by financial institutions and email services, enabling attackers to circumvent two-factor authentication without physical access to the victim’s smartphone.

Persistence and Command Structure

To maintain a foothold on the compromised system, CloudZ employs a Rust-compiled dropper that establishes a scheduled task named SystemWindowsApis. This task ensures the malware’s persistence, allowing it to survive system reboots and continue its malicious activities.

Implications and Preventative Measures

This exploitation of the Microsoft Phone Link application underscores the evolving tactics of cybercriminals, who are increasingly targeting legitimate software to infiltrate systems and exfiltrate sensitive information.

To mitigate the risk of such attacks, users are advised to:

– Exercise Caution with Software Updates: Only download updates from official sources and verify their authenticity before installation.

– Monitor System Processes: Regularly review active processes for unfamiliar or suspicious activity.

– Implement Robust Security Measures: Utilize comprehensive security solutions capable of detecting and neutralizing advanced threats.

– Stay Informed: Keep abreast of emerging threats and adjust security practices accordingly.

By adopting these proactive measures, users can enhance their defenses against sophisticated cyber threats that exploit trusted applications for malicious purposes.