• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

New Phishing Marketing campaign Exploits Google Storage to Ship Remcos RAT

Admin by Admin
April 9, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


A lately noticed phishing marketing campaign is abusing Google Cloud Storage to ship the Remcos distant entry trojan (RAT), counting on trusted Google infrastructure and a signed Microsoft binary to evade conventional defenses.

Attackers host a pretend Google Drive login web page on the professional area storage.googleapis.com, making the URL seem reliable to each customers and safety instruments.

As an alternative of registering their very own area, they add a crafted HTML web page that intently mimics Google’s interface and branding.

The operation highlights how reputation-based filtering alone is not sufficient to cease fashionable credential theft and malware supply.

The web page requests the sufferer’s electronic mail deal with, password, and one‑time passcode, successfully capturing full account entry. Utilizing Google’s infrastructure additionally helps phishing hyperlinks bypass some electronic mail filters and URL-reputation checks that favor nicely‑recognized cloud suppliers.

Multi‑stage an infection chain

After a “profitable” login, the positioning prompts the consumer to obtain a JavaScript file named Bid‑Packet‑INV‑Doc.js, offered as a doc or bid packet.

When executed, this script runs beneath Home windows Script Host, contains time‑based mostly evasion logic, and launches the subsequent stage VBS script.

The primary VBS stage downloads and silently runs one other VBS file, which drops parts beneath %APPDATApercentWindowsUpdate and configures Startup persistence so the malware survives reboot.

A PowerShell script, DYHVQ.ps1, then orchestrates the loading of an obfuscated moveable executable saved as ZIFDG.tmp, which incorporates the Remcos RAT payload.

To remain stealthy, the chain fetches an extra obfuscated .NET loader from a textual content‑internet hosting service (Textbin). It masses it instantly in reminiscence through Meeting.Load.

The .NET loader abuses RegSvcs.exe, a professional Microsoft .NET Companies Set up Instrument positioned within the framework listing, for course of hollowing.

As a result of RegSvcs.exe is signed by Microsoft and infrequently has a clear VirusTotal repute, its execution normally seems benign in endpoint logs.

The loader creates or begins RegSvcs.exe from %TEMP%, hollowing the method and injecting the Remcos payload in order that a lot of the malicious logic executes solely in reminiscence.

This ends in {a partially} fileless Remcos occasion that communicates with its command‑and‑management (C2) server whereas hiding behind a trusted course of identify.

Detection and protection suggestions

Safety groups shouldn’t rely solely on area or file repute when triaging alerts involving Google cloud domains or signed Home windows binaries.

Behavioral sandboxing and EDR telemetry are key: defenders ought to monitor for suspicious script chains (JS → VBS → PowerShell), uncommon creation of WindowsUpdate‑like folders in %APPDATA%, and RegSvcs.exe launching from atypical paths akin to %TEMP%.

Community controls ought to flag outbound connections following execution of scripting engines and newly spawned .NET processes, particularly when preceded by entry to storage.googleapis.com hyperlinks.

Lastly, consumer consciousness campaigns should emphasize that even hyperlinks pointing to nicely‑recognized cloud suppliers can host phishing pages and malware, and any surprising login prompts or script downloads from “Drive paperwork” must be handled with warning.

Observe us on Google Information, LinkedIn, and X to Get On the spot Updates and Set GBH as a Most well-liked Supply in Google.

Tags: CampaigndeliverExploitsGooglePhishingRATRemcosstorage
Admin

Admin

Next Post
When Area Service Stalls, It Prices You: D365 vs ServiceNow

When Area Service Stalls, It Prices You: D365 vs ServiceNow

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025
Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Iran-linked hackers disrupt operations at US vital infrastructure websites

Iran-linked hackers disrupt operations at US vital infrastructure websites

April 9, 2026
When Area Service Stalls, It Prices You: D365 vs ServiceNow

When Area Service Stalls, It Prices You: D365 vs ServiceNow

April 9, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved