<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Phone-Link — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/phone-link/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 10:01:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/phone-link/feed.xml" rel="self" type="application/rss+xml"/><item><title>CloudZ RAT Abusing Windows Phone Link to Steal OTPs</title><link>https://feed.craftedsignal.io/briefs/2026-05-cloudz-rat/</link><pubDate>Tue, 05 May 2026 10:01:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cloudz-rat/</guid><description>An unknown attacker is using the CloudZ RAT and its Pheno plugin to hijack the Microsoft Phone Link application and intercept SMS and OTP messages from connected mobile devices, active since at least January 2026.</description><content:encoded><![CDATA[<p>Cisco Talos discovered an intrusion campaign, active since at least January 2026, involving the deployment of the CloudZ RAT and a novel plugin named &ldquo;Pheno&rdquo;. The attackers are leveraging these tools to steal credentials and potentially one-time passwords (OTPs) by abusing the Microsoft Phone Link application in Windows. CloudZ utilizes the Pheno plugin to monitor and hijack the PC-to-phone bridge established by Phone Link. This allows the attacker to scan for active Phone Link processes and intercept sensitive mobile data, such as SMS messages and OTPs, without directly infecting the mobile device. The CloudZ RAT also employs various anti-analysis techniques, including dynamic execution of critical functions in memory and checks to evade debuggers and sandbox environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with an unknown initial access vector, leading to the execution of a fake ScreenConnect application update.</li>
<li>This malicious executable drops and executes an intermediate .NET loader executable.</li>
<li>The .NET loader decrypts and deploys the modular CloudZ RAT onto the victim&rsquo;s machine.</li>
<li>Upon execution, the CloudZ RAT decrypts its configuration data and establishes an encrypted connection to its command-and-control (C2) server.</li>
<li>CloudZ exfiltrates credentials from the victim&rsquo;s machine browser data and downloads and implants the Pheno plugin.</li>
<li>The Pheno plugin performs reconnaissance of the Microsoft Phone Link application on the victim machine and writes reconnaissance data to an output file.</li>
<li>CloudZ reads the Phone Link application data from the staging folder.</li>
<li>CloudZ sends the exfiltrated credentials, along with the data obtained from the Phone Link application, to the C2 server, potentially compromising SMS-based OTP messages and other authenticator application notification messages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This campaign poses a significant threat to users of the Microsoft Phone Link application, potentially exposing sensitive information, including SMS-based OTPs, to unauthorized access. Successful exploitation can lead to account compromise, financial fraud, and other malicious activities. The number of victims and specific sectors targeted are currently unknown, but the potential for widespread impact is considerable given the prevalence of Windows 10 and 11 and the use of OTPs for multi-factor authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for execution of <code>regasm.exe</code> with command-line arguments pointing to unusual locations, especially within the <code>C:\ProgramData</code> directory, using the Sigma rule &ldquo;Detect Suspicious RegAsm Execution for Persistence&rdquo;.</li>
<li>Detect connections to the known malicious URL <code>hxxps[://]calm-wildflower-1349[.]hellohiall[.]workers[.]dev</code> at the network level or endpoint using a network connection monitoring tool or web proxy.</li>
<li>Enable process monitoring and file access auditing for the Microsoft Phone Link application database files (e.g., &ldquo;PhoneExperiences-*.db&rdquo;) to detect unauthorized access or modification by suspicious processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloudz</category><category>rat</category><category>pheno</category><category>phone-link</category><category>otp</category><category>credential-theft</category></item></channel></rss>