
Often called a menace actor. Cloud Atlas 2024 has been seen utilizing beforehand undocumented malware known as VBCloud as a part of cyber assault campaigns concentrating on “a number of dozen customers”.
“Victims are contaminated by phishing emails that include a malicious doc that downloads malware code into the Components Editor (CVE-2018-0802),” Kaspersky researcher Oleg Kapreev stated in an evaluation revealed this week. takes benefit of the vulnerability to do and implement.”
Greater than 80 % of the targets had been in Russia. Smaller numbers of victims have been reported from Belarus, Canada, Moldova, Israel, Kyrgyzstan, Turkey and Vietnam.
Often known as Clear Ursa, Inception, Oxygen, and Purple October, Cloud Atlas is an unattributed menace exercise cluster energetic since 2014. In December 2022, the group was linked to cyber assaults geared toward Russia, Belarus and Transnistria. A PowerShell-based backdoor known as PowerShower.

Then, precisely a yr later, Russian cybersecurity firm FACCT revealed that numerous organizations within the nation had been focused by spear-mining assaults that exploited an previous flaw (CVE-2017-11882) in Microsoft Workplace Equation Editor’s Visible Fundamental Skip Script (VBS) payload. Subsequent step unknown VBS is chargeable for downloading the malware.
Kaspersky’s newest report reveals that these elements are a part of what it calls VBShower, which is then used to obtain and set up PowerShower in addition to VBCloud.
The start line of the assault chain is a phishing e-mail containing a bobby-trapped Microsoft Workplace doc that, when opened, downloads a malicious template formatted as an RTF file from a distant server. It then exploits CVE-2018-0802, one other flaw within the equation editor, to fetch and run an HTML software (HTA) file hosted on the identical server.
An exploiter downloads an HTA file by way of an RTF template and runs it, Kupriev stated. “It takes benefit of the Alternate Knowledge Streams (NTFS ADS) function to extract and create a number of recordsdata at %APPDATApercentRoamingMicrosoftWindows. These recordsdata create the VBShower backdoor.”
It features a launcher, which acts as a loader by extracting and operating backdoor modules in reminiscence. The second VB script is a cleaner that takes care of deleting the contents of all recordsdata contained in the “LocalMicrosoftWindowsTemporary Web FilesContent.Phrase” folder, along with its personal recordsdata and people contained in the launcher. Thus it’s lined. Proof of malicious exercise.

The VBShower backdoor is designed to retrieve extra VBS payloads from a command and management (C2) server that comes with system restart capabilities. amassing details about recordsdata in several folders, operating course of names, and scheduler duties; And set up PowerShower and VBCloud.
PowerShower is analogous in performance to VBShower, with the principle distinction being that it downloads and executes next-step PowerShell scripts from the C2 server. It’s also geared up to work as a downloader for zip archive recordsdata.
Kaspersky has noticed seven PowerShell payloads. Every of those capabilities individually as:
- Get an inventory of native teams and their members on distant computer systems by the Lively Listing Service Interface (ADSI).
- Carry out dictionary assaults on person accounts.
- Open the zip archive downloaded by PowerShell and execute the PowerShell script inside to carry out a Kerberosting assault, which is a post-exploitation approach for acquiring credentials for Lively Listing accounts.
- Get an inventory of administrator teams.
- Get an inventory of area controllers.
- Get details about the recordsdata inside this system knowledge folder.
- Get account coverage and password coverage settings on the native laptop.

VBCloud works equally to VBShower, however makes use of a public cloud storage service for C2 communication. It’s triggered by a scheduled activity each time an contaminated person logs into the system.
About malware disk (drive letter, drive sort, media sort, measurement, and free area), system metadata, recordsdata and paperwork matching extensions DOC, DOCX, XLS, XLSX, PDF, TXT, RTF, and RAR Is provided to obtain info. , and recordsdata associated to the Telegram messaging app.
“PowerShower probes the native community and facilitates additional infiltration, whereas VBCloud collects details about the system and steals recordsdata,” Kupriev stated. “The an infection chain consists of a number of phases and finally goals to steal knowledge from the sufferer’s units.”