A newly discovered malware campaign is exposing a dangerous shift in attacker tactics:
👉 Your phone doesn’t need to be infected anymore… your PC is enough.
Security researchers have uncovered a remote access tool (RAT) called CloudZ, paired with a custom plugin named Pheno, that can silently intercept SMS messages, notifications, and one-time passwords (OTPs)—without ever touching the victim’s mobile phone.
Instead of attacking the phone directly, this malware exploits a trusted bridge:
👉 Microsoft Phone Link
What Is Microsoft Phone Link — and Why It’s Being Targeted
Microsoft Phone Link is a legitimate application used by millions of users to:
- Sync phone notifications to Windows
- View and send SMS messages
- Access call logs
- Mirror mobile activity on a PC
👉 It essentially acts as a live bridge between your phone and your computer
CloudZ turns this convenience feature into a surveillance tool.
What Makes This Attack Unique
Unlike traditional mobile malware, this campaign:
✅ Does NOT infect the smartphone
✅ Does NOT require rooting or mobile exploits
✅ Does NOT need user interaction on the phone
👉 It simply hijacks the existing trusted connection between devices
How the CloudZ Attack Works (Step-by-Step)
1) Initial infection (fake update)
The attack begins on the PC:
- Victim downloads a fake update for a remote support tool
- Executes a malicious file disguised as a system update
- This drops a hidden .NET loader
2) CloudZ RAT deployment
Once executed:
- The RAT bypasses basic security checks
- Gains control of the system
- Prepares additional modules
3) Pheno plugin activation
This is where things get interesting.
Pheno scans for active Phone Link processes:
- “YourPhone”
- “PhoneExperienceHost”
- “Link to Windows”
👉 If detected, it confirms that the PC is paired with a mobile device
4) Verifying active connection
The malware checks whether Phone Link is actively routing data between devices.
If confirmed: 👉 It signals the attacker: “Target ready”
5) Extracting sensitive data from local database
Instead of accessing the phone directly, CloudZ reads:
👉 A local SQLite database on the PC
File example:
- PhoneExperiences-*.db
This database contains:
- SMS messages
- App notifications
- Call logs
The Critical Risk: OTP and MFA Bypass
This is where the attack becomes extremely dangerous.
If OTP codes (banking, email, authentication) are synced to Phone Link:
👉 The attacker can read them from the PC
That means:
- No need to access the victim’s phone
- No need to intercept SMS traffic
- No need to break encryption
👉 They simply read the OTPs locally
💀 Result:
Two-Factor Authentication can be bypassed
without compromising the second factor itself
Advanced Evasion Techniques
CloudZ is engineered for long-term stealth.
Anti-analysis features
It checks for tools like:
- Wireshark
- Procmon
- Fiddler
- Sysmon
If detected: 👉 It terminates immediately
In-memory execution
Sensitive functions are:
- Generated dynamically
- Executed in memory
👉 Making detection and reverse engineering harder
Living-off-the-land techniques
CloudZ uses legitimate tools like:
- regasm.exe
👉 Blends malicious activity with normal system operations
Persistence Mechanism
To survive reboots, CloudZ:
- Creates a scheduled task: SystemWindowsApis
- Runs at startup under SYSTEM privileges
- Ensures continuous access for attackers
Command-and-Control Evasion
CloudZ avoids traditional detection:
- Rotates browser-like user agents (Chrome, Safari, Firefox)
- Uses Pastebin-hosted configuration
- Pulls C2 infrastructure dynamically
👉 Blocking static IPs alone is not enough
Why This Attack Is So Dangerous
This is not just another RAT.
It introduces a new category of risk:
✅ Device-to-device trust abuse
Instead of breaking into the phone: 👉 It exploits how devices trust and sync with each other
✅ MFA bypass without compromise
No phishing of OTPs
No SIM swapping
👉 Just reading synced messages locally
✅ Invisible attack surface
Most organizations monitor:
- Endpoints
- Network traffic
- Mobile devices
👉 But NOT:
- Cross-device sync apps
What Security Teams Must Learn
1) Sync apps are a new attack surface
Anything that mirrors data is a potential entry point.
2) MFA is not bulletproof
If OTPs are exposed via another channel: 👉 MFA can be bypassed
3) Endpoint compromise = identity compromise
Once attackers control the PC: 👉 They control everything synced to it
4) Trust relationships can be weaponized
The weakest link is often: 👉 A legitimate feature used in unintended ways
Detection and Mitigation
Immediate actions:
✅ Monitor for unusual Phone Link database access
✅ Detect unauthorized use of regasm.exe
✅ Restrict installation of untrusted remote tools
✅ Disable Phone Link where not required
✅ Monitor scheduled tasks with suspicious names
✅ Watch for unexpected outbound traffic patterns
Advanced controls:
✅ Endpoint Detection & Response (EDR) with memory monitoring
✅ Application allowlisting
✅ Privileged access monitoring
✅ Behavioral analytics on sync applications
Indicators of Compromise (Defanged)
C2 Infrastructure
- 185[.]196[.]10[.]136:8089
- hxxps[://]round-cherry-4418[.]hellohiall[.]workers[.]dev
- https[://]pastebin[.]com/raw/8pYAgF0Z
Suspicious Files
- systemupdates.exe
- Windows-interactive-update.exe
- pheno.exe
Persistence
- Scheduled task: SystemWindowsApis
⚠️ Note: Indicators are defanged. Re-enable only in controlled environments.
Common Misconceptions
❌ “My phone is secure, so I’m safe”
👉 Your PC can expose your phone data
❌ “MFA protects everything”
👉 Synced OTPs can bypass MFA
❌ “It’s just a remote access tool”
👉 It’s a cross-device attack platform
FAQs
Does this malware infect the phone?
No. It exploits the connection between the phone and the PC.
What data is stolen?
SMS messages, notifications, OTP codes, and call logs.
Why is this dangerous?
Because it allows attackers to bypass authentication mechanisms without access to the phone.
Conclusion
CloudZ is a wake-up call for modern security models.
👉 The attack didn’t break into the phone
👉 It broke into the relationship between devices
This represents a broader shift:
The next generation of attacks won’t target devices individually
They’ll target the connections between them
For defenders, that means:
✅ Expanding visibility beyond endpoints
✅ Monitoring cross-device data flows
✅ Rethinking how trust is enforced