The threat actor group known as Cloud Sweep has significantly evolved its tactics with the introduction of its "Phase 30" campaign. This new methodology demonstrates a sophisticated understanding of incident response and disaster recovery procedures. Instead of just encrypting live data, Cloud Sweep is now targeting the recovery process itself by compromising cold storage backups. The group embeds a dormant malware payload into data archives as they are being created. This malware remains inert while in storage but is designed to activate upon data restoration. When a victim attempts to recover from the attack, the malware triggers, re-encrypting the newly restored systems and ensuring the failure of the recovery process. This insidious technique undermines the core strategy of relying on offline backups to recover from ransomware.
This attack represents a paradigm shift in ransomware strategy, moving from a single-stage encryption event to a multi-stage attack designed to defeat recovery. The attack lifecycle is as follows:
The success of this attack hinges on the malware remaining dormant and undetected during the backup and storage phases.
certutil to download the final encryption payload, making it harder to detect.T1486 - Data Encrypted for Impact: The ultimate goal of the attack, executed in two stages.T1490 - Inhibit System Recovery: This is the core of the new technique, actively sabotaging the recovery process by compromising the backups themselves.T1574.002 - Hijack Execution Flow: DLL Side-Loading: A potential method for embedding the dormant payload, where a legitimate application restored from backup loads a malicious DLL placed alongside it.T1136 - Create Account: Attackers may create accounts on backup servers to maintain persistence and carry out the compromise.This attack methodology dramatically increases the potential impact of a ransomware incident:
Detection must now be integrated into the backup and recovery lifecycle.
D3-DA - Dynamic Analysis.Mitigation requires enhancing existing backup strategies with new verification steps.
D3-FA - File Analysis.While the attack targets backups, having multiple, versioned, and geographically separate backup copies (including one truly offline) remains a critical mitigation.
Scanning data both before backup and after restoration is a critical control to detect the embedded malware. This requires robust, up-to-date AV/EDR solutions.
Strictly controlling and monitoring administrative access to backup servers can prevent attackers from gaining the permissions needed to tamper with backup jobs.
To counter the 'Phase 30' attack, organizations must integrate Dynamic Analysis into their disaster recovery playbook. This means that after restoring servers from any backup (especially cold storage), the restored systems must NOT be immediately connected to the production network. Instead, they should be brought online in a completely isolated 'recovery sandbox'. In this environment, the systems should be allowed to run for a period to allow any dormant malware to activate. EDR agents and behavior monitoring tools should be active in the sandbox to watch for suspicious activities like unexpected encryption processes, C2 callbacks, or deletion of volume shadow copies. This 'detonation chamber' approach is the most effective way to uncover a compromised backup before it can re-infect the production environment.
A multi-layered File Analysis strategy is essential. First, all data should be scanned by AV/EDR solutions before being written to backup media. This provides a first line of defense. Second, and more critically for the 'Phase 30' threat, a full file analysis must be performed on data after it is restored but before it goes live. In the recovery sandbox, every file restored from the archive should be rescanned using the latest malware signatures and heuristics. This is crucial because detection signatures may have been updated between the time the backup was made and the time it was restored. This two-stage scanning process—pre-backup and post-restore—significantly increases the probability of catching a dormant payload embedded by groups like Cloud Sweep.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats