Cloud Atlas Deploys VBCloud Malware: Rising Threat in Russia and Beyond

3 views 2 minutes read

VBCloud Malware is a rising threat: ThreatCloud Atlas, a long-active cybercrime group, has been linked to a new wave of cyberattacks leveraging a sophisticated malware known as VBCloud.

These attacks, which have targeted organizations primarily in Russia and other countries, highlight the group’s evolving tactics in 2024. According to Kaspersky’s analysis, VBCloud malware plays a critical role in data theft and system infiltration, utilizing phishing emails to exploit vulnerabilities in the Microsoft Office Equation Editor.

This new development raises concerns for cybersecurity professionals and emphasizes the importance of vigilance against cyber threats.

Key Takeaway to Cloud Atlas and VBCloud Malware:

  • Cloud Atlas is employing VBCloud malware to target organizations, primarily in Russia, posing significant cybersecurity risks worldwide.

Unpacking the Threat: How Cloud Atlas Uses VBCloud Malware

Who Is Cloud Atlas?

Cloud Atlas, also known as Clean Ursa, Inception, Oxygen, and Red October, has been active since 2014. The group is known for sophisticated cyberattacks using spear-phishing campaigns to deliver malware payloads.

Previous operations linked to the group include the December 2022 attacks in Russia, Belarus, and Transnistria, deploying the PowerShower backdoor.

The VBCloud Malware

The latest campaign leverages VBCloud, an advanced malware variant used alongside VBShower and PowerShower. This malware enables the attackers to:

  • Steal sensitive data: Including documents, system metadata, and Telegram-related files.
  • Use cloud storage for communication: Enhancing stealth and resilience against detection.
  • Execute staged attacks: Using phishing emails and RTF templates to exploit vulnerabilities like CVE-2018-0802.

Attack Chain Breakdown

Here’s how the attack unfolds:

StageDetails
Phishing EmailA malicious document is sent to targets.
RTF Template InjectionExploits Equation Editor flaws to download an HTML Application (HTA) file.
VBShower DeploymentUses NTFS ADS to create malicious files and cover tracks.
VBCloud ActivationScheduled tasks trigger VBCloud for data collection and communication.

Impact and Reach

Kaspersky’s report reveals that over 80% of the victims are based in Russia, with others identified in Belarus, Canada, Moldova, Israel, Kyrgyzstan, Turkey, and Vietnam.

VBCloud’s use of public cloud storage for command-and-control (C2) communications makes it uniquely capable of bypassing conventional security measures.

Real-Life Example

This isn’t the first time Cloud Atlas has used sophisticated techniques to target victims.

In 2022, the group deployed PowerShower malware in spear-phishing attacks, exploiting Microsoft Office vulnerabilities to infiltrate systems.

Forecast: The Evolving Threat Landscape

As cybercriminals like Cloud Atlas refine their tools and tactics, we’re likely to see increased use of cloud-based communication for malware.

Organizations must prioritize patching vulnerabilities, implementing robust email filters, and training staff to recognize phishing attempts.

About Kaspersky

Kaspersky is a global cybersecurity company renowned for its advanced threat intelligence and solutions. They offer comprehensive protection for enterprises, governments, and individuals worldwide.

Rounding Up

The rise of VBCloud malware demonstrates Cloud Atlas’s ability to innovate and adapt, underscoring the need for continuous cybersecurity vigilance. By staying informed about threats like VBCloud, organizations can better protect their systems and data.

By taking proactive steps and staying alert to evolving threats like VBCloud malware, individuals and organizations can significantly reduce their risk of falling victim to these attacks.


FAQs

What is VBCloud malware?

  • VBCloud is a type of malware used by Cloud Atlas for data theft and system infiltration.

How does VBCloud infect systems?

  • It uses phishing emails with malicious documents exploiting vulnerabilities in Microsoft Office.

Who are the primary targets of Cloud Atlas?

  • Over 80% of the victims are in Russia, with others in Belarus, Canada, Moldova, Israel, Kyrgyzstan, Turkey, and Vietnam.

What measures can protect against VBCloud?

  • Regularly update software, use advanced email filters, and educate users about phishing tactics.

Why is VBCloud difficult to detect?

  • It uses public cloud storage for C2 communications, making it harder to trace.

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2023 – All Right Reserved | Designed & Powered by HostAdvocate

CyberSecurityCue (Cyber Security Cue) Logo
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More