Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs

?Ravie Lakshmanan?May 06, 2026

Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous undocumented plugin dubbed Pheno with the aim of facilitating credential theft.

“According to the functionalities of the CloudZ RAT and Pheno plugin, this was with the intention of stealing victims’ credentials and potentially one-time passwords (OTPs),” Cisco Talos researchers Alex Karkins and Chetan Raghuprasad said in a Tuesday analysis.

What makes the attack novel is that CloudZ uses the custom Pheno plugin to hijack the established PC-to-phone bridge by abusing the Microsoft Phone Link application, permitting the plugin to monitor for active Phone Link processes and potentially intercept sensitive mobile data like SMS and one-time passwords (OTPs) without the need for deploying malware on the phone.

The findings demonstrate how legitimate cross-device syncing features can expose unintended attack pathways to credential theft and help bypass two-factor authentication. What’s more, it obviates the need to compromise the mobile device itself.

The malware, per the cybersecurity company, has been put to use as part of an intrusion that’s been active since at least January 2026. The activity has not been attributed to any known threat actor or group.

Built into Windows 10 and Windows 11, Phone Link offers a way for users to pair their computer with an Android device or iPhone over Wi-Fi and Bluetooth, allowing users to make or take phone calls, send messages, and dismiss notifications.

Unknown threat actors have been observed attempting to leverage the application using CloudZ RAT and Pheno to confirm Phone Link activity on a victim environment and then access the SQLite database file used by the program to store the synchronized phone data.

The attack chain is said to have employed an as-yet-undetermined initial access method to obtain a foothold and drop a fake ConnectWise ScreenConnect executable that’s responsible for downloading and running a .NET loader.  The initial dropper also makes use of an embedded PowerShell script to establish persistence by setting up a scheduled task that runs the malicious .NET loader.

The intermediate loader is designed to run hardware and environment checks to evade detection and deploy the modular CloudZ trojan on the machine. Once executed, the .NET-compiled trojan decrypts an embedded configuration, establishes an encrypted socket connection to the command-and-control (C2) server, and awaits Base64-encoded instructions that allow it to exfiltrate credentials and implant additional plugins.

Some of the commands supported by CloudZ include –

  • pong, to send heartbeat responses
  • PING!, to issue a heartbeat request
  • CLOSE, to terminate the trojan process
  • INFO, to collect system metadata
  • RunShell, to execute shell command
  • BrowserSearch, to exfiltrate web browser data
  • GetWidgetLog, to exfiltrate Phone Link recon logs and data
  • plugin, to load a plugin
  • savePlugin, to save a plugin to disk at the staging directory (“C:\ProgramData\Microsoft\whealth\”)
  • sendPlugin, to upload a plugin to C2 server
  • RemovePlugins, to remove all deployed plugin modules
  • Recovery, to enable recovery or reconnection
  • DW, to conduct download and file write operations
  • FM, to conduct file management operations
  • Msg, to send a message to C2 server
  • Error, to report errors to C2 server
  • rec, to record the screen

“The attacker used a plugin called Pheno to perform reconnaissance of the Windows Phone Link application in the victim machine,” Talos said. “The plugin performs reconnaissance of the Microsoft Phone Link application on the victim machine and writes the reconnaissance data to an output file in a staging folder. CloudZ reads back the Phone Link application data from the staging folder and sends it to the C2 server.” #LivingSafeOnline, #Cybersecurity, #WindowsPhoneLink, #CloudZRAT, #CredentialTheft, #OTPStealing, #Malware, #CyberDefense, #CyberRisk, #OnlineSecurity, #CyberCrime, #NationalSecurity, #DigitalSafety, #CyberPolicy, #CyberPower

read more

India’s PNB hikes cybersecurity spend as AI models including Anthropic’s Mythos raise risks

Story by Nishit Navin and Ashwin Manikandan

BENGALURU/MUMBAI, May 5 (Reuters) – India’s Punjab National Bank is stepping up investments in cybersecurity and accelerating procurement of technology to guard against rising digital threats including those from advanced AI models, a senior executive said on Tuesday.

AD

The country’s third largest state-run lender by market capitalisation has earmarked about 20% of its technology budget for cybersecurity, or roughly 7 billion to 8 billion rupees ($73.5 million – $84 million) for the current financial year, executive director D Surendran told Reuters in an interview, adding that this allocation is more than 50% higher than the previous year.

“We don’t want to compromise on this kind of expenditure,” Surendran said, adding the bank will increase the spending further if required.

PNB’s move comes amid heightened regulatory focus on risks emerging from advanced AI models including Anthropic’s Mythos.

Last month India’s finance minister Nirmala Sitharaman met with heads of top banks to gauge preparedness against AI-related cybersecurity risks. India’s central bank has also been in talks with global regulators, lenders and government officials to understand the potential risks, Reuters has reported.

PNB is also fast-tracking purchases of security tools, including firewalls and other systems to address vulnerabilities, Surendran said.

“We have increased our frequency of audit… now we have made our audit process 24/7 so that the criticality will be identified fast,” Surendran said.

PNB SEES SUSTAINED LOAN GROWTH

The New-Delhi based lender, earlier in the day, posteda more than 14% rise in net profit to 52.25 billion rupees, helped by healthy loan growth and improving asset quality.

Loans grew 12.7% year-on-year while deposits rose 9.2%.

The bank will target 12-13% loan growth in financial year 2026/27, Surendran said, driven by credit to small and medium-sized enterprises and retail loans, he said.

The bank expects deposits to grow around 9-10% for the year.

($1 = 95.2800 Indian rupees)

(Reporting by Nishit Navin and Ashwin Manikandan; Editing by Ronojoy Mazumdar)

#LivingSafeOnline, #Cybersecurity, #PNB, #IndianBanks, #AIThreats, #AnthropicMythos, #DigitalSafety, #CyberDefense, #FinancialSecurity, #BankingRisk, #CyberInvestment, #AIinFinance, #NationalSecurity, #CyberRisk, #FinTechSecurity, #CyberPolicy, #CyberCrime, #RiskManagement, #CyberPower.
read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.0/10 based on 12 reviews.
Verified by MonsterInsights