<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft-Phone-Link — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/microsoft-phone-link/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 10:03:52 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/microsoft-phone-link/feed.xml" rel="self" type="application/rss+xml"/><item><title>CloudZ RAT Abuses Microsoft Phone Link to Steal SMS and OTPs</title><link>https://feed.craftedsignal.io/briefs/2026-05-cloudz-pheno/</link><pubDate>Tue, 05 May 2026 10:03:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cloudz-pheno/</guid><description>A new version of the CloudZ RAT utilizes the Pheno plugin to hijack Microsoft Phone Link connections, enabling the theft of SMS messages and one-time passwords (OTPs) from victims' mobile devices.</description><content:encoded><![CDATA[<p>A new variant of the CloudZ remote access tool (RAT) has been observed deploying a novel plugin named Pheno. This plugin specifically targets the Microsoft Phone Link application, pre-installed on Windows 10 and 11, to intercept SMS messages and one-time passwords (OTPs) from connected mobile devices (Android and iOS). The observed intrusion campaign began in January 2026, with researchers assessing that the primary goal of the threat actor is to steal credentials and temporary passcodes. The attacker leverages the Phone Link application&rsquo;s SQLite database, which stores SMS messages and potentially authenticator application notifications, to gain access to sensitive information without directly compromising the mobile device. The CloudZ RAT also uses rotating user-agent strings and anti-caching headers to evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The victim executes a fake ScreenConnect update.</li>
<li>A Rust-based loader is dropped onto the system.</li>
<li>A .NET loader is deployed, which contains anti-analysis checks (time-based sandbox evasion, Wireshark, Fiddler, Procmon, Sysmon).</li>
<li>The .NET loader installs the CloudZ RAT.</li>
<li>Persistence is established via a scheduled task.</li>
<li>The Pheno plugin monitors for active Microsoft Phone Link sessions.</li>
<li>Pheno accesses the local SQLite database of the Phone Link application.</li>
<li>SMS messages and one-time passwords (OTPs) are stolen from the database, granting the attacker access to sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass SMS-based multi-factor authentication (MFA) and gain unauthorized access to protected accounts and systems. The impact can include financial fraud, data theft, and further compromise of the victim&rsquo;s digital assets. While the exact number of victims remains unknown, the targeted theft of credentials and OTPs suggests a broad campaign aimed at a wide range of individuals and organizations. The sectors targeted are currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for execution of processes originating from temporary directories, as this is often where the initial loader may execute from. Deploy the Sigma rule <code>Detect CloudZ RAT Loader Execution from Temp Directory</code> to identify this behavior.</li>
<li>Implement network monitoring to detect suspicious HTTP traffic from infected hosts. Pay attention to rotating user-agent strings and the presence of anti-caching headers.</li>
<li>Consider disabling or restricting the use of Microsoft Phone Link in enterprise environments where SMS-based OTPs are used.</li>
<li>Encourage users to switch to authenticator apps that do not rely on SMS or push notifications and to adopt phishing-resistant MFA solutions like hardware security keys.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloudz</category><category>malware</category><category>rat</category><category>microsoft-phone-link</category><category>credential-theft</category><category>otp</category><category>sms</category></item></channel></rss>