Security researchers at Cisco Talos have uncovered a previously undocumented malware campaign that abuses the legitimate Microsoft Phone Link application to steal sensitive mobile data. The attack uses a .NET remote access trojan (RAT) called CloudZ and a specialized plugin named Pheno. Instead of targeting the mobile device directly, the malware infects a user's Windows PC. The Pheno plugin then hijacks the data synced by the Phone Link app, giving attackers access to mirrored SMS messages, notifications, and, most critically, one-time passwords (OTPs) used for multi-factor authentication. This attack vector is particularly dangerous for enterprises as it circumvents mobile security measures and targets company-managed PCs, effectively undermining a common form of two-factor authentication.
The attack hinges on exploiting the trust relationship established between a user's smartphone and their Windows PC via the Phone Link app. The app is designed to mirror phone notifications, messages, and calls onto the desktop for convenience.
This entire process occurs without any malware being installed on the smartphone itself. The phone's security is irrelevant; the attack surface is the paired Windows computer.
CloudZ is a modular .NET RAT that incorporates several defense evasion techniques, including obfuscation and the ability to detect debuggers and analysis environments. Its capabilities include file management, shell command execution, and screen recording.
The Pheno plugin is the key component for this specific attack. Its sole purpose is to locate and steal the Phone Link SQLite database, which is typically stored in the user's local application data directory (%LocalAppData%). By targeting this database, the attackers gain access to a treasure trove of information that is temporarily synced from the phone.
T1111 - Two-Factor Authentication Interception: The primary goal of the attack is to intercept OTPs to bypass MFA.T1555.003 - Credentials from Password Stores: Credentials from Web Browsers: While not a browser, the Phone Link SQLite database acts as a local credential and data store that is being targeted.T1219 - Remote Access Software: CloudZ is a full-featured Remote Access Trojan.T1560.003 - Archive Collected Data: Archive via Custom Method: The malware accesses and exfiltrates data from the SQLite database.T1056.001 - Input Capture: Keylogging: Although not the primary method, the CloudZ RAT has capabilities that could include keylogging to capture other credentials.The impact of this attack is significant, particularly for organizations that rely on SMS-based OTPs for multi-factor authentication.
No specific Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were provided in the source articles.
Security teams can hunt for this activity by monitoring for suspicious access to Phone Link data.
%LocalAppData%\Packages\Microsoft.YourPhone_*\LocalState\*.dbYourPhone.exe, PhoneExperienceHost.exe*ScreenConnect*YourPhone.exe or PhoneExperienceHost.exe reading this file is highly suspect. This aligns with D3FEND's Decoy File concept if a canary file is placed in the directory.User Behavior Analysis.Application Configuration Hardening measure, if Phone Link is not a business-critical application, use application control policies to block its execution on enterprise assets.Move away from interceptable MFA methods like SMS. Implement phishing-resistant MFA such as FIDO2 security keys.
Use EDR tools to detect and block abnormal behaviors, such as a non-Phone Link process accessing the Phone Link database.
If Microsoft Phone Link is not required for business purposes, disable or uninstall it via Group Policy to eliminate this attack surface.
Deploy and maintain endpoint protection to detect and quarantine the CloudZ RAT.
This attack specifically targets and defeats a weak form of MFA (SMS OTPs). The most critical countermeasure is to upgrade the organization's authentication standards. Mandate the use of phishing-resistant MFA for all users, especially for access to VPN, email, and critical applications. The gold standard is FIDO2/WebAuthn hardware security keys. A strong alternative is the use of authenticator apps that provide push notifications with number matching, which requires user interaction on the trusted device and is not susceptible to the passive interception demonstrated by CloudZ. By removing the reliance on SMS, this entire attack chain is rendered ineffective for the purpose of account takeover.
To detect the CloudZ RAT's activity on a compromised host, security teams should leverage an EDR solution to perform detailed process analysis. Specifically, create detection rules that monitor for any process other than YourPhone.exe or PhoneExperienceHost.exe attempting to read or access files within the %LocalAppData%\Packages\Microsoft.YourPhone_*\ directory. This is a highly specific and anomalous behavior. Furthermore, baseline the typical behavior of the legitimate Phone Link processes and alert on any deviations, such as spawning unusual child processes (e.g., cmd.exe, powershell.exe) or making network connections to uncategorized IP addresses. This focused monitoring can identify the Pheno plugin's core function and expose the RAT.
Cisco Talos first observes the malware campaign activity.
Cisco Talos and other media outlets publish details of the CloudZ and Pheno malware.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.