Nation-State Threats

Cloud Atlas Emerges with New Tools in 2026

The notorious Cloud Atlas group is back, wielding new malware and a familiar playbook of SSH tunneling. Threat Digest unpacks their latest moves and what it means for cybersecurity.

A digital map showing interconnected nodes, with some glowing red to represent compromised systems.

Key Takeaways

  • Cloud Atlas has resurfaced with new malware (VBCloud, PowerShower) and persistent SSH tunnel activity.
  • They are using malicious `.lnk` files to execute PowerShell scripts for initial compromise and persistence.
  • Leveraging public utilities like Tor and SSH for C2 makes their operations harder to track and disrupt.

Shadows Lengthen.

And just like that, the ghosts of digital past are back, reanimated and armed with fresh artillery. Cloud Atlas, a moniker that’s haunted government and commercial entities in Russia and Belarus since at least 2014, has re-emerged from the murky depths of the cyber underground. This isn’t just a rehash; it’s an evolution, a subtle but significant architectural shift in how this persistent threat actor operates, evidenced by new tools and a payload that’s more insidious than ever. For those tracking the ever-shifting sands of nation-state cyber operations, this development demands a closer look.

The hallmarks of Cloud Atlas are still there: phishing emails, archives, malicious shortcuts. It’s a familiar dance, but the music has changed tempo. This time, alongside the old tricks of exploiting legacy Microsoft Office vulnerabilities like CVE-2018-0802 with malicious documents, they’re leaning heavily on archives containing malicious .lnk files. These aren’t your grandpa’s viruses; they’re sophisticated stubs designed to pull down and execute PowerShell scripts, often from external, less scrutinizable resources. Think of it as a digital breadcrumb trail, leading not to a gingerbread house, but to a fully compromised system.

And here’s where it gets particularly interesting: the expanded use of third-party public utilities like Tor, SSH, and RevSocks. This isn’t just about establishing a command-and-control (C2) channel; it’s about building a resilient, obfuscated network of backdoors. By leveraging tools designed for legitimate connectivity, Cloud Atlas is weaving a complex web that’s harder to untangle and significantly more resilient to takedown efforts. It’s the digital equivalent of using a busy highway interchange to hide a clandestine operation.

The Phishing Foundation, Amplified

The initial infection vector remains stubbornly traditional: phishing. The modus operandi involves sending ZIP archives packed with .lnk files. These aren’t the kind of shortcuts that lead to your favorite meme folder; they’re cleverly crafted to bypass basic defenses and silently trigger PowerShell scripts. The scripts, fetched from remote servers, perform a multi-stage operation designed for stealth and persistence.

First, the script drops a local copy of itself – $temp?ixed.ps1 – ensuring that even if the network connection flakes out, the core functionality remains. Then, it stakes its claim with early persistence, inscribing a registry key named YandexBrowser_setup (a rather ironic choice, given the geopolitical context) to ensure execution upon the next logon or reboot. This is crucial; it buys them time and guarantees their presence even if the initial exploit is detected and removed.

Next, it downloads a decoy archive, $temp ar.zip. This archive contains .pdf files. Why PDFs? To distract the user, of course. The script opens this seemingly innocuous document with the user’s default PDF viewer, creating a legitimate-looking activity to mask the silent background operations that are preparing for the main payload. While you’re reading about the latest government policy or a charming travelogue, the real work is happening.

Actions performed by the downloaded PowerShell: Step 6 | User distraction: opens a convincing document to maintain user engagement and creates a legitimate workflow appearance to buy additional 30–120 seconds for background operations.

Once the decoy is active, the script cleans house, terminating the archive extraction process (taskkill.exe /F /Im winrar.exe) and ruthlessly deleting the initial infection artifacts – the .zip files, the .pdf files, and the .lnk file itself. This anti-forensic step is designed to leave minimal traces for incident responders. Only after this meticulous cleanup does it finally execute the primary payload, $temp?ixed.ps1, now that persistence is secured and the user is none the wiser.

VBCloud and PowerShower: A Dual-Threat Arsenal

The fixed.ps1 script isn’t just a loader; it’s the architect of a dual infection. It’s responsible for dropping two distinct pieces of malware onto the compromised system: VBCloud and PowerShower.

VBCloud is the stealthy thief. It operates as a backdoor, designed primarily for data exfiltration. Dropped as video.vbs (the launcher) and video.mds (the encrypted backdoor), it decrypts and executes its core functionality in memory. Its specific focus is on targeting and stealing files with extensions like .DOC, .PDF, and .XLS. Imagine your sensitive financial reports or confidential strategy documents being silently siphoned off – that’s VBCloud’s domain.

PowerShower, on the other hand, is the scout and infiltrator. While VBCloud snatches data, PowerShower focuses on network reconnaissance and lateral movement. It’s the tool for understanding the victim’s internal landscape, identifying running processes, locating domain controllers, and crucially, conducting “Kerberoasting” attacks to steal password hashes from Active Directory accounts. This grants attackers a deeper foothold, allowing them to move across the network undetected and potentially gain administrative control.

This duality is a significant architectural shift. It shows Cloud Atlas isn’t just about opportunistic infections; they’re building a persistent, multi-functional presence within target networks, capable of both immediate data theft and long-term strategic compromise.

What This Means for You

Cloud Atlas’s renewed activity, armed with sophisticated evasion techniques and a dual-malware payload, is a stark reminder that the threat landscape is anything but static. Their ability to use public utilities for C2 obfuscation, combined with a meticulous approach to persistence and anti-forensics, makes them a formidable adversary. For organizations in or connected to Russia and Belarus, this is a clear and present danger, demanding heightened vigilance and strong security measures, particularly around email-borne threats and endpoint detection.


🧬 Related Insights

Frequently Asked Questions

What is Cloud Atlas doing now? Cloud Atlas is now using new tools and techniques, including malicious shortcuts that launch PowerShell scripts, to compromise government and commercial organizations. They are also utilizing public utilities like Tor and SSH for command and control.

Are VBCloud and PowerShower related? Yes, both VBCloud and PowerShower are installed by the fixed.ps1 script deployed by Cloud Atlas. VBCloud is designed for data theft, while PowerShower focuses on network reconnaissance and lateral movement.

Which countries are primarily affected by Cloud Atlas? Cloud Atlas has been observed affecting government organizations and commercial companies in Russia and Belarus.

Written by
Threat Digest Editorial Team

Curated insights, explainers, and analysis from the editorial team.

Frequently asked questions

What is Cloud Atlas doing now?
Cloud Atlas is now using new tools and techniques, including malicious shortcuts that launch PowerShell scripts, to compromise government and commercial organizations. They are also utilizing public utilities like Tor and SSH for command and control.
Are VBCloud and PowerShower related?
Yes, both VBCloud and PowerShower are installed by the `fixed.ps1` script deployed by Cloud Atlas. VBCloud is designed for data theft, while PowerShower focuses on network reconnaissance and lateral movement.
Which countries are primarily affected by Cloud Atlas?
Cloud Atlas has been observed affecting government organizations and commercial companies in Russia and Belarus.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Securelist (Kaspersky)

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.