Close Menu
AI Security Weekly
  • Artificial Intelligence
  • Cybersecurity
  • Threats & Breaches
  • Privacy & Policy
  • Tools
  • Trends & Research
  • MSP MSSP
  • Blogs & Insights

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
AI Security WeeklyAI Security Weekly
Subscribe
  • Artificial Intelligence
  • Cybersecurity
  • Threats & Breaches
  • Privacy & Policy
  • Tools
  • Trends & Research
  • MSP MSSP
  • Blogs & Insights
AI Security Weekly
Home » Targets in Russia Exceed 80% Success Rate
Threats and Breaches

Targets in Russia Exceed 80% Success Rate

ContributorBy ContributorMay 2, 2025No Comments3 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Targets in russia exceed 80% success rate
Share
Facebook Twitter LinkedIn Pinterest Telegram Email

Dec 27, 2024Ravie LakshmananCyber Attack / Data Theft

Introduction of VBCloud Malware

The cyber threat group known as Cloud Atlas has recently been traced using a new type of malware referred to as VBCloud, targeting numerous users throughout 2024.

Attack Vector and Victims

According to Kaspersky researcher Oleg Kupreev, victims are compromised through phishing emails containing harmful documents that exploit a known vulnerability in the formula editor (CVE-2018-0802), which downloads and executes the malware.

Notably, over 80% of the affected individuals are located in Russia, with additional cases reported in Belarus, Canada, Moldova, Israel, Kyrgyzstan, Turkey, and Vietnam.

Background on Cloud Atlas

Also known as Clean Ursa, Inception, Oxygen, and Red October, Cloud Atlas has remained active since 2014. In December 2022, the group was connected to attacks targeting Russia, Belarus, and Transnistria, using a PowerShell backdoor dubbed PowerShower.

Exploiting Vulnerabilities

A year later, Russian cybersecurity firm F.A.C.C.T. disclosed that various organizations in the country faced spear-phishing attacks exploiting an older Microsoft Office flaw (CVE-2017-11882) to introduce a Visual Basic Script (VBS) payload that downloads additional unknown VBS malware.

Kaspersky’s findings reveal that these components form a system named VBShower, which is responsible for loading both PowerShower and VBCloud.

Details of the Attack Chain

The attack commences with a phishing email containing a malicious Microsoft Office document that, upon being opened, attempts to fetch a harmful RTF template from a remote server. This document leverages CVE-2018-0802 to download a malicious HTML Application (HTA) file.

Once downloaded, the HTA file executes and employs the NTFS alternate data streams (ADS) feature to generate various files in the %APPDATA%\Roaming\Microsoft\Windows\ directory, forming the VBShower backdoor components.

Functionality of VBCloud and PowerShower

The VBShower backdoor is capable of retrieving additional VBS payloads from a command-and-control (C2) server, offering functionality to reboot the system, gather information, and install both PowerShower and VBCloud.

While PowerShower serves a similar function, it specifically downloads and executes PowerShell scripts from the C2 server, and it can also download ZIP files.

Capabilities and Data Exfiltration

VBCloud operates similarly to VBShower by using public cloud storage for C2 communication, triggered by scheduled tasks whenever a user logins into their system. It collects extensive system information, including storage details and specific file types related to documents.

As noted by Kupreev, the infection chain comprises multiple stages aiming to collect sensitive data and infiltrate further into networks, with VBCloud focusing on information collection and file theft.

Exceed Rate Russia Success Targets
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
contact
Contributor

Related Posts

Sophos Launches MSP Elevate to Drive Partner Success

May 15, 2025

Projected to Expand at a Steady Rate

May 10, 2025

Essential Insights on Cybersecurity Threats, Tools, and Best Practices

May 5, 2025

Essential Cybersecurity Threats, Strategies, and Insights

May 5, 2025

Old D-Link Vulnerabilities Open Doors for Global Attacks by FICORA and Kaiten Botnets

May 2, 2025

PLDT Enterprise Celebrates Success with Cisco Partner Awards for Managed Services and SMB Excellence

May 2, 2025
Leave A Reply Cancel Reply

Top Reviews
We're Social
  • Facebook
  • Twitter
  • Instagram
  • LinkedIn
Editors Picks

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025

Creating a Trust Layer for AI and Web3: Insights from Polyhedra

May 15, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

About Us
About Us

At AI Security Weekly, we are dedicated to delivering the latest news, insights, and analysis on artificial intelligence security. As AI technologies continue to evolve, so do the threats, vulnerabilities, and solutions that shape the cybersecurity landscape. Our mission is to keep security professionals, researchers, and tech enthusiasts informed about the rapidly changing world of AI-driven security risks and defenses.

Trends

Crafting a Robust SOC Automation Plan

May 15, 2025

Sophos Launches MSP Elevate to Drive Partner Success

May 15, 2025

ManageEngine Unveils AI Innovations for Enhanced PAM Solutions

May 11, 2025
Don't Miss

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025
© 2025 AI Security Weekly. All Rights Reserved.
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.