Threat Alerts
Your place for the latest CyberProof cyber threat intelligence alerts and updates
Speak with an ExpertNANOREMOTE Backdoor Exploits Google Drive API for C2
Newly discovered NANOREMOTE, a sophisticated Windows backdoor, leverages Google Drive API for command-and-control operations, making detection extremely challenging. The malware shares code similarities with the FINALDRAFT espionage family and demonstrates advanced evasion techniques through legitimate cloud service abuse.
The infection begins with WMLOADER, a deceptive loader masquerading as legitimate security software like Bitdefender’s BDReinit.exe but carrying invalid digital signatures. This loader performs complex decryption operations using rolling XOR algorithms to decrypt embedded shellcode, which then searches for wmsetup.log files and decrypts them using AES-CBC encryption with hardcoded keys. The shellcode subsequently loads NANOREMOTE directly into memory, bypassing traditional detection mechanisms. NANOREMOTE integrates open-source libraries including Microsoft Detours for API hooking and libPeConv for custom PE loading capabilities.
NANOREMOTE operates as a fully-featured backdoor written in C++ with 22 command handlers enabling comprehensive system control. The malware communicates with hardcoded IP addresses over HTTP using JSON data compressed with Zlib and encrypted with AES-CBC. Its Google Drive integration uses OAuth 2.0 tokens for authentication, creating covert channels for data exfiltration and payload staging that blend seamlessly with legitimate cloud traffic. The malware includes advanced file transfer capabilities with task queuing, pause/resume functionality, and refresh token generation. Strong forensic evidence links NANOREMOTE to the REF7707 threat cluster through shared encryption keys, identical GUID generation methods, and code reuse patterns, indicating a common development environment and codebase.
Rust-Based Malware Adoption Accelerates Across Platforms
Threat actors are increasingly shifting from traditional programming languages like C and C++ to modern alternatives including Rust, Golang, and Nim, enabling threat actors to develop cross-platform malicious code that compiles for both Windows and Linux with minimal modifications. This trend is exemplified by the emergence of Luca Stealer, a newly identified information-stealing malware written in Rust that targets both operating systems simultaneously. The strategic adoption of Rust by malware developers reflects a broader industry shift toward languages that offer memory safety features while maintaining performance, making detection and analysis more challenging for security teams. This cross-platform capability significantly expands the attack surface and potential victim pool for threat actors deploying information stealers.
New 01flip Rust Ransomware Emerges
A new ransomware family called 01flip has emerged, targeting critical infrastructure across the Asia-Pacific region. Written entirely in Rust programming language, this cross-platform threat can compromise both Windows and Linux systems simultaneously, representing a significant evolution in ransomware development tactics.
The threat actors behind 01flip, tracked as CL-CRI-1036, employ manual attack methods rather than automated campaigns. They exploit older vulnerabilities like CVE-2019-11580 (CVSS 9.8) to gain initial access to internet-facing applications, after which operators establish persistence and conduct lateral movement using the Sliver post-exploitation framework. Once deployed, the ransomware selectively encrypts user data while deliberately avoiding system-critical files to maintain host stability. A notable artifact within the malware is a hardcoded exclusion related to “lockbit,” which may suggest code reuse or ecosystem overlap, though no conclusive attribution can be made based on this indicator alone.
The threat actors have been observed selling stolen data on dark web forums shortly after ransomware deployment, indicating a double extortion approach. The malware implements several evasion techniques including runtime string decoding, low-level API usage, and anti-sandbox mechanisms that detect analysis environments. This campaign appears to be in early stages but demonstrates the growing trend of cybercriminals adopting modern programming languages to enhance cross-platform capabilities and evade traditional detection methods.
Storm-0249 Exploits EDR Processes via DLL Sideloading
A sophisticated threat actor has advanced from basic phishing tactics into a highly capable adversary that weaponizes legitimate Endpoint Detection and Response (EDR) software to conceal malicious activity. By abusing trusted security processes through DLL sideloading, the group effectively turns defensive tools into attack vectors, allowing their operations to blend seamlessly with normal security software behavior. This evolution represents a significant escalation that undermines traditional defenses and poses severe risks to organizations across all industries.
Analysis shows the attack chain begins with social engineering that convinces victims to execute encoded commands through the Windows Run dialog, followed by the use of built-in Windows utilities to download and run malicious PowerShell payloads directly in memory, bypassing signature-based detection. The attackers deploy a trojanized installer that leverages Windows Installer’s elevated privileges to place a malicious DLL in low-visibility directories, enabling the legitimate EDR executable to load the adversary’s component instead of its authentic counterpart. Once active, the malware establishes encrypted C2 communications disguised as routine EDR traffic. Post-compromise reconnaissance uses native Windows tools to extract system identifiers that facilitate rapid ransomware preparation, reducing the time from initial access to deployment from weeks to days. The abuse of digitally signed executables and TLS encryption renders traditional monitoring ineffective, demonstrating that signature-driven defenses cannot adequately counter adversaries who exploit trust in legitimate security software.
ValleyRAT Modular Backdoor with Sophisticated Kernel-Level Functions
ValleyRAT, also known as Winos or Winos4.0, represents a sophisticated modular backdoor that has experienced significant growth in deployment over recent months. This malware family demonstrates advanced technical capabilities through its comprehensive plugin architecture and embedded kernel-mode rootkit, posing serious risks to organizations worldwide.
The malware operates through a modular system comprising 19 distinct main plugins, each serving specialized functions ranging from initial reconnaissance to advanced system manipulation. The infection typically begins with first-stage components that establish communication with command-and-control infrastructure, followed by selective deployment of additional modules based on victim profiling. Notable capabilities include remote desktop control, keylogging, file management, audio and video capture, DDoS functionality, and registry manipulation. The plugin system demonstrates consistent coding patterns and deep knowledge of Windows internals, suggesting development by a small, specialized team. Each component maintains encrypted communication channels using custom XOR-based schemes and can operate independently while contributing to the overall backdoor functionality.
The most concerning aspect involves a kernel-mode rootkit embedded within the driver plugin, derived from the open-source Hidden project but significantly modified for modern Windows compatibility. This rootkit implements file system filtering, registry hiding, process protection, and APC-based shellcode injection directly from kernel space. Multiple deployment variants were discovered with valid digital signatures that exploit legacy driver signing policy exceptions, allowing successful loading on fully updated Windows 11 systems despite expired certificates. The rootkit includes sophisticated installation modes, including a stealth variant that disrupts network connectivity and employs process impersonation techniques to evade behavioral detection. Additional capabilities enable forceful deletion of security software drivers and persistent system-level access through service configuration manipulation.
SAP Patch Day Addresses Multiple Critical Vulnerabilities Across Core Enterprise Platforms
SAP released 14 new security notes in its December Patch Day, including three critical vulnerabilities affecting Solution Manager, Commerce Cloud, and jConnect SDK that pose severe risks of code injection, deserialization attacks, and full system compromise. The most critical flaw, CVE-2025-42880 (CVSS 9.9), allows low-privileged users to inject and execute arbitrary code in SAP Solution Manager, while CVE-2025-55754 exposes Commerce Cloud deployments through embedded Apache Tomcat weaknesses, and CVE-2025-42928 enables high-privilege deserialization attacks in jConnect SDK for ASE. Additional high- and medium-severity issues impact NetWeaver, Web Dispatcher, ABAP Server, BusinessObjects, SAPUI5, and S/4HANA components, creating avenues for data exposure, DoS conditions, and privilege misuse. As exploitation risks rise for SAP landscapes, organizations are urged to prioritize the latest patches through the Support Portal, validate environments using EarlyWatch and similar scanning tools, and update vulnerable systems without delay.
NEWS AND RESOURCES
What’s on at CyberProof
Speak with an expert
Explore how CyberProof can help you anticipate, prevent, and mitigate ever-evolving cyberattacks in hybrid and cloud-native environments.
SPEAK WITH AN EXPERT










