
The risk actor referred to as Cloud Atlas has been noticed the use of a prior to now undocumented malware referred to as VBCloud as a part of its cyber assault campaigns focused on “a number of dozen customers” in 2024.
“Sufferers get inflamed by means of phishing emails containing a malicious report that exploits a vulnerability within the method editor (CVE-2018-0802) to obtain and execute malware code,” Kaspersky researcher Oleg Kupreev mentioned in an research revealed this week.
Greater than 80% of the goals had been positioned in Russia. A lesser selection of sufferers had been reported from Belarus, Canada, Moldova, Israel, Kyrgyzstan, Turkey, and Vietnam.
Additionally known as Blank Ursa, Inception, Oxygen, and Purple October, Cloud Atlas is an unattributed risk process cluster that has been energetic since 2014. In December 2022, the crowd used to be connected to cyber assaults aimed toward Russia, Belarus, and Transnistria that deployed a PowerShell-based backdoor referred to as PowerShower.

Then precisely a 12 months later, Russian cybersecurity corporate F.A.C.C.T. published that more than a few entities within the nation had been focused by means of spear-phishing assaults that exploited an outdated Microsoft Administrative center Equation Editor flaw (CVE-2017-11882) to drop a Visible Fundamental Script (VBS) payload chargeable for downloading an unknown next-stage VBS malware.
Kaspersky’s newest file finds that those parts are a part of what it calls VBShower, which is then used to obtain and set up PowerShower in addition to VBCloud.
The place to begin of the assault chain is a phishing e mail that accommodates a booby-trapped Microsoft Administrative center report that, when opened, downloads a malicious template formatted as an RTF document from a far flung server. It then abuses CVE-2018-0802, any other flaw within the Equation Editor, to fetch and run an HTML Utility (HTA) document hosted at the similar server.
“The exploit downloads the HTA document by means of the RTF template and runs it,” Kupreev mentioned. “It leverages the exchange information streams (NTFS ADS) characteristic to extract and create a number of information at %APPDATAp.cRoamingMicrosoftWindows. Those information make up the VBShower backdoor.”
This features a launcher, which acts as a loader by means of extracting and working the backdoor module in reminiscence. The opposite VB Script is a cleaner that cares about erasing the contents of all information within the “LocalMicrosoftWindowsTemporary Web FilesContent.Phrase” folder, along with the ones inside of itself and the launcher, thereby masking up proof of the malicious process.

The VBShower backdoor is designed to retrieve extra VBS payloads from the command-and-control (C2) server that incorporates functions to reboot the gadget; accumulate details about information in more than a few folders, names of working processes, and scheduler duties; and set up PowerShower and VBCloud.
PowerShower is similar to VBShower in capability, the manager distinction being that it downloads and executes next-stage PowerShell scripts from the C2 server. Additionally it is provided to function a downloader for ZIP archive information.
As many as seven PowerShell payloads had been noticed by means of Kaspersky. Each and every of them carries out a definite process as follows –
- Get a listing of native teams and their participants on far flung computer systems by means of Lively Listing Carrier Interfaces (ADSI)
- Behavior dictionary assaults on person accounts
- Unpack ZIP archive downloaded by means of PowerShower and execute a PowerShell script contained inside of it with a view to perform a Kerberoasting assault, which is a post-exploitation methodology for acquiring credentials for Lively Listing accounts
- Get a listing of administrator teams
- Get a listing of area controllers
- Get details about information within the ProgramData folder
- Get the account coverage and password coverage settings at the native pc

VBCloud additionally purposes so much like VBShower, however makes use of public cloud garage carrier for C2 communications. It will get prompted by means of a scheduled process each and every time a sufferer person logs into the gadget.
The malware is provided to reap details about disks (force letter, force sort, media sort, dimension, and loose area), gadget metadata, information and paperwork matching extensions DOC, DOCX, XLS, XLSX, PDF, TXT, RTF, and RAR, and information associated with the Telegram messaging app.
“PowerShower probes the native community and facilitates additional infiltration, whilst VBCloud collects details about the gadget and steals information,” Kupreev mentioned. “The an infection chain is composed of a number of phases and in the long run targets to thieve information from sufferers’ units.”