Cloud Atlas conducted widespread SSH tunnel activity through 2025 into 2026 against government and commercial targets in Russia and Belarus, using phishing archives, malicious LNK files, PowerShell loaders, and multiple backup access tools. The campaign added VBCloud, PowerShower, RevSocks, Tor, and PowerCloud to support theft, reconnaissance, persistence, and covert remote access. #CloudAtlas #VBCloud #PowerShower #RevSocks #PowerCloud
Keypoints
- Cloud Atlas activity remained active in 2025 and 2026, targeting organizations in Russia and Belarus.
- Initial access commonly used phishing ZIP archives containing malicious LNK files that launched PowerShell scripts.
- The group also used older malicious document infection chains leveraging CVE-2018-0802 in Microsoft Office Equation Editor.
- Fixed.ps1 delivered additional payloads, including the VBCloud backdoor and the PowerShower backdoor.
- PowerShower supported reconnaissance, lateral movement, Kerberoasting, and credential theft via SAM and SECURITY file collection.
- Attackers deployed reverse SSH tunnels, RevSocks, and Tor Hidden Services to maintain backup control channels and evade disruption.
- PowerCloud exfiltrated administrator-related data to Google Sheets in Base64 format, while a browser-checking script logged active browsers to determine user presence.
MITRE Techniques
- [T1566.001 ] Phishing: Spearphishing Attachment â Initial access was gained by emailing ZIP archives with malicious LNK files attached (âthe attackers emailed a ZIP archive containing an LNK file as an attachmentâ).
- [T1204.002 ] User Execution: Malicious File â The shortcut relied on the user opening the attachment and executing the malicious LNK (âarchives containing malicious shortcutsâ).
- [T1059.001 ] Command and Scripting Interpreter: PowerShell â Malicious LNK files launched PowerShell scripts from external resources (âcovertly execute PowerShell scripts hosted on external resourcesâ).
- [T1059.005 ] Command and Scripting Interpreter: Visual Basic â VBScript was used for tunnel setup and execution (ârun VBS scripts via PAExec or PsExecâ).
- [T1547.001 ] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder â Persistence was created by adding payloads to Run keys (âCreates âRunâ registry key âYandexBrowser_setupââ).
- [T1112 ] Modify Registry â The malware modified registry settings to ensure startup and persistence (âCreates âRunâ registry keyâ).
- [T1105 ] Ingress Tool Transfer â Scripts downloaded additional payloads and decoy archives from remote servers (âDownloads and drops â$temprar.zipââ).
- [T1027 ] Obfuscated Files or Information â Multiple components were encrypted, encoded, or packed to hinder analysis (âencrypted body of the backdoorâ, âencoded in base64â).
- [T1021.001 ] Remote Services: Remote Desktop Protocol â Attackers enabled and abused RDP for interactive access (âallow multiple RDP sessions in Windows 10â).
- [T1218.011 ] System Binary Proxy Execution: Rundll32? â Not explicitly mentioned.
- [T1218.002 ] System Binary Proxy Execution: Control Panel â Privilege escalation and UAC bypass were performed through fodhelper.exe (âuses a UAC bypass technique via fodhelper.exeâ).
- [T1562.001 ] Impair Defenses: Disable or Modify Tools â The script killed WinRAR to conceal activity and removed artifacts (âexecutes âtaskkill.exe /F /Im winrar.exeââ, âsearches and deletesâ).
- [T1070.004 ] File Deletion â The attack cleaned up infection artifacts to reduce forensic traces (âSearches and deletes ârar.zipâ, â*.pdf.zipâ and â*.pdf.lnkââ).
- [T1098 ] Account Manipulation â The script changed permissions on folders to block access to private keys (âset new access permissions to the folder containing the private keyâ).
- [T1090.001 ] Proxy: Internal Proxy â RevSocks and SSH tunnels were used as proxy channels for remote access (âallow direct connection to workstations on the local networkâ).
- [T1090.003 ] Proxy: Multi-hop Proxy â Reverse SSH tunnels and Tor Hidden Services created layered access paths (âbypass standard firewall rulesâ, âaccessible via RDP from the Tor networkâ).
- [T1021.004 ] Remote Services: SSH â Reverse SSH tunnels were established from the compromised host to attacker-controlled infrastructure (âthe compromised machine initiates an SSH connectionâ).
- [T1219 ] Remote Access Software â RevSocks provided remote connectivity and network access (âinstalled RevSocksâ).
- [T1095 ] Non-Application Layer Protocol â Tunnel traffic and port forwarding were used to move access through non-standard channels (âforwarding ports to the Tor networkâ).
- [T1082 ] System Information Discovery â PowerShower collected information about processes, administrator groups, and domain controllers (âCollect information about running processes, administrator groups, and domain controllersâ).
- [T1018 ] Remote System Discovery â PowerShower identified domain controllers and network structure (âdomain controllersâ).
- [T1003.001 ] OS Credential Dumping: LSASS Memory â Not explicitly mentioned.
- [T1003.002 ] OS Credential Dumping: Security Account Manager â The credential grabber copied SAM and SECURITY files from Volume Shadow Copy (âCopies the SAM ⌠and SECURITY system filesâ).
- [T1003.006 ] OS Credential Dumping: DCSync â Not mentioned.
- [T1003.003 ] OS Credential Dumping: NTDS â Not mentioned.
- [T1134 ] Access Token Manipulation â Not mentioned.
- [T1113 ] Screen Capture â Not mentioned.
- [T1016 ] System Network Configuration Discovery â The browser checker and tunnel setup imply host environment checking, but this technique is not directly stated.
- [T1056.001 ] Input Capture: Keylogging â Not mentioned.
- [T1047 ] Windows Management Instrumentation â Not mentioned.
- [T1543.003 ] Create or Modify System Process: Windows Service â The RDP service was restarted after patching (âthe script restarts the RDP serviceâ).
- [T1484.001 ] Domain or Tenant Policy Modification â Not mentioned.
- [T1046 ] Network Service Discovery â PowerShower and related tooling performed network reconnaissance (ânetwork reconnaissanceâ).
- [T1106 ] Native API â Not mentioned.
- [T1135 ] Network Share Discovery â Not mentioned.
Indicators of Compromise
- [File hashes] malicious components and loaders â 1A11B26DD0261EF27A112CE8B361C247, 5329F7BFF9D0D5DB28821B86C26D628F, and other hashes such as 2B4BA4FACF8C299749771A3A4369782E
- [File names] VBS, PowerShell, and payload files used in execution chains â WriteToSchedulerKillSSH.vbs, WriteToSchedulerGenerateKey.vbs, and other names such as rdp_new.ps1 and googleearth.ps1
- [File paths] dropped or abused binaries and scripts on victim hosts â C:WindowsPLASystemRun.vbs, C:ProgramDatahpclient.exe, and other paths such as C:Users[username]Picturesgoogleearth.ps1
- [Domains] reverse SSH/SOCKS and staging infrastructure â tenkoff[.]org, cloudguide[.]in, and other domains such as oneërivesupport[.]net and znews[.]net
- [IP addresses] PowerShell payload staging servers â 194.102.104[.]207, 46.17.45[.]56, and other IPs including 185.22.154[.]73 and 193.125.114[.]57
- [Hash / sample identifiers] malicious Office documents and auxiliary samples â the report lists a long MS Office document hash set and samples for ReverseSocks and browser-checking payloads, including 5329F7BFF9D0D5DB28821B86C26D628F