Ransomware & Malware

CloudZ RAT Abuses Phone Link for SMS & OTP Theft

Forget compromising your phone. The latest CloudZ malware variant has figured out a sneakier way to nab your SMS codes and one-time passwords: right from your Windows desktop.

A stylized illustration depicting a laptop computer screen displaying a messaging app with a malicious code overlay.

Key Takeaways

  • CloudZ malware's new Pheno plugin exploits Microsoft Phone Link to steal SMS and OTPs from Windows PCs.
  • The attack bypasses the need to compromise the mobile device itself, targeting the Phone Link application's local database.
  • Users are advised to avoid SMS-based OTPs and opt for authenticator apps or hardware security keys for better security.

Look, another day, another piece of malware figuring out how to make our lives harder. This time, it’s the CloudZ remote access tool (RAT) that’s gotten a nasty upgrade. They’ve slapped on a new plugin called Pheno, and it’s doing something… well, something incredibly annoying and potentially damaging. It’s piggybacking on Microsoft’s Phone Link application, which, as you know, is supposed to make your phone and computer play nice. Instead, Pheno is using that connection to slurp up sensitive messages, specifically those one-time passwords (OTPs) and text messages, all without actually having to touch your mobile device itself.

This isn’t some theoretical threat; Cisco Talos researchers dropped the intel today, detailing an intrusion that’s been quietly chugging along since January. The goal? Pretty much what you’d expect: credential harvesting and stealing those precious, ephemeral passcodes that keep our digital lives just secure enough.

Microsoft Phone Link. You probably have it. It’s baked into Windows 10 and 11. Makes calls, texts, pings you about notifications from your phone. Convenient, right? Apparently, convenient enough for bad actors to weaponize. By hijacking this seemingly innocuous link, they’re intercepting messages destined for your phone. No jailbreak, no root exploit needed.

Sneaky Access, Stolen Secrets

The Pheno plugin. It’s the star of this particular horror show. Cisco Talos says it’s watching for active Phone Link sessions. Once it spots one, it dives into the application’s local SQLite database. Why? Because that database can apparently contain SMS messages and, you guessed it, OTPs. So, you get a text with a login code; the attacker, if you’re unlucky enough to be targeted, gets it too, likely before you even see it on your phone. The magic is that the attacker doesn’t need to break into your phone; they just need to break into your computer where Phone Link is running. It’s like stealing mail from a shared mailbox without actually picking the lock on the individual’s house.

“With a confirmed Phone Link activity on the victim’s machine, the attacker using the CloudZ RAT can potentially intercept the Phone Link application’s SQLite database file on the victim’s machine, potentially compromising SMS-based OTP messages and other authenticator application notification messages,” explain Cisco Talos researchers.

And CloudZ itself isn’t exactly a lightweight piece of software. Beyond Pheno’s telepathic messaging capabilities, the RAT can poke around your browser data, profile your system, and pretty much do whatever the attacker wants: manage files, run commands, record your screen, and generally make your computer its own private playground. They’re even clever enough to rotate user-agent strings to make their malicious HTTP traffic look like regular browser requests, and they’ve got anti-caching headers in place to keep their command-and-control servers a bit more elusive. Sophisticated stuff, unfortunately.

How Do They Get In?

The initial entry point? That’s still a bit murky – the researchers haven’t nailed it down. But the infection chain they’ve observed starts with a user clicking on what looks like a fake ScreenConnect update. This drops a loader written in Rust, which then deploys another loader written in .NET. That .NET loader is the one that ultimately installs the CloudZ RAT and sets up shop using a scheduled task for persistence. And don’t think they’re not trying to thwart analysis; this .NET loader has checks for sandboxes, analysis tools like Wireshark and Fiddler, and even looks for VM-related strings. They don’t want their dirty work dissected.

Can You Actually Defend Against This?

Cisco’s advice here is… well, it’s what we’ve been saying for years. Ditch SMS-based OTPs if you can. Use proper authenticator apps. And for the really sensitive stuff? Think hardware keys. Stuff that doesn’t rely on a message that can be intercepted by… well, by malware using your own legitimate software.

Cisco Talos has helpfully put out a list of Indicators of Compromise (IoCs) – the URLs, hashes, domains, and IPs you’d need to block. So, if you’re running a security team, check that out. For the rest of us, it’s another reminder that the attack surface isn’t just the internet; it’s also the convenient features we enable on our own machines.

This whole Phone Link abuse feels like a classic Silicon Valley move: build a feature to make things easier, and then wait for someone to figure out how to break it. Who’s making money here? The malware authors, obviously. And perhaps Microsoft makes a bit of money on the OS license, but they’re probably spending more now dealing with this fallout. The users? They’re just trying to avoid having their bank accounts drained because their phone decided to have a chat with their laptop.

This isn’t just about CloudZ; it’s about the interconnectedness we demand. The more we link our devices, the more opportunities we create for threats like Pheno to exploit those bridges.

--- ### 🧬 Related Insights - **Read more:** [CanisterWorm: Cybercrooks Hijack Iran Tensions for Cloud Data Heists](https://threatdigest.io/article/canisterworm-cybercrooks-hijack-iran-tensions-for-cloud-data-heists/) - **Read more:** [Cyber Insurance Guide: What Businesses Need to Know About Coverage](https://threatdigest.io/article/cyber-insurance-guide-what-businesses-need-to-know-about-coverage/) Frequently Asked Questions

What does the Pheno plugin do? Pheno is a plugin for the CloudZ RAT that monitors for Microsoft Phone Link activity and accesses its local database to steal SMS messages and one-time passwords (OTPs) from the victim’s computer.

Will this affect my iPhone? While Microsoft Phone Link supports iOS, the Cisco Talos report specifically mentions the ability to intercept SMS messages and OTPs, which are more common for Android devices and Windows integrations. The primary risk highlighted is for users of Android phones connected to Windows machines.

What’s the best way to protect myself from SMS OTP theft? Security researchers strongly recommend moving away from SMS-based OTPs for critical accounts. Instead, use dedicated authenticator apps like Google Authenticator or Authy, or consider phishing-resistant methods like hardware security keys (e.g., YubiKey) for enhanced security. The CloudZ malware’s Phone Link exploitation makes SMS OTPs even riskier.

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Frequently asked questions

What does the Pheno plugin do?
Pheno is a plugin for the CloudZ RAT that monitors for Microsoft Phone Link activity and accesses its local database to steal SMS messages and one-time passwords (OTPs) from the victim's computer.
Will this affect my iPhone?
While Microsoft Phone Link supports iOS, the Cisco Talos report specifically mentions the ability to intercept SMS messages and OTPs, which are more common for Android devices and Windows integrations. The primary risk highlighted is for users of Android phones connected to Windows machines.
What's the best way to protect myself from SMS OTP theft?
Security researchers strongly recommend moving away from SMS-based OTPs for critical accounts. Instead, use dedicated authenticator apps like Google Authenticator or Authy, or consider phishing-resistant methods like hardware security keys (e.g., YubiKey) for enhanced security. The CloudZ malware’s Phone Link exploitation makes SMS OTPs even riskier.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.