'CloudZ' Malware Hijacks Microsoft Phone Link to Intercept SMS and OTPs from PCs

New 'CloudZ' Malware Abuses Microsoft Phone Link to Steal Mobile Data

HIGH
May 5, 2026
5m read
MalwareData BreachPhishing

Related Entities

Organizations

Products & Tech

Microsoft Phone LinkWindows 10Windows 11ScreenConnect

Other

CloudZPheno

Full Report

Executive Summary

Security researchers at Cisco Talos have uncovered a previously undocumented malware campaign that abuses the legitimate Microsoft Phone Link application to steal sensitive mobile data. The attack uses a .NET remote access trojan (RAT) called CloudZ and a specialized plugin named Pheno. Instead of targeting the mobile device directly, the malware infects a user's Windows PC. The Pheno plugin then hijacks the data synced by the Phone Link app, giving attackers access to mirrored SMS messages, notifications, and, most critically, one-time passwords (OTPs) used for multi-factor authentication. This attack vector is particularly dangerous for enterprises as it circumvents mobile security measures and targets company-managed PCs, effectively undermining a common form of two-factor authentication.

Threat Overview

The attack hinges on exploiting the trust relationship established between a user's smartphone and their Windows PC via the Phone Link app. The app is designed to mirror phone notifications, messages, and calls onto the desktop for convenience.

  1. Initial Compromise: The system is first infected with the CloudZ RAT. While the primary delivery method is not fully understood, one observed vector was a fake ScreenConnect application update.
  2. Plugin Deployment: The CloudZ RAT deploys the Pheno plugin onto the compromised Windows machine.
  3. Process Scanning: The Pheno plugin continuously scans for active Phone Link processes, waiting for the user to connect their phone.
  4. Database Theft: Once an active Phone Link session is detected, the malware accesses the application's local SQLite database file on the PC. This database contains a mirrored copy of the phone's recent SMS messages and notifications.
  5. Data Exfiltration: The contents of the database, including sensitive SMS messages and OTPs from authenticator apps, are exfiltrated by the CloudZ RAT to the attacker's command-and-control server.

This entire process occurs without any malware being installed on the smartphone itself. The phone's security is irrelevant; the attack surface is the paired Windows computer.

Technical Analysis

CloudZ is a modular .NET RAT that incorporates several defense evasion techniques, including obfuscation and the ability to detect debuggers and analysis environments. Its capabilities include file management, shell command execution, and screen recording.

The Pheno plugin is the key component for this specific attack. Its sole purpose is to locate and steal the Phone Link SQLite database, which is typically stored in the user's local application data directory (%LocalAppData%). By targeting this database, the attackers gain access to a treasure trove of information that is temporarily synced from the phone.

MITRE ATT&CK Mapping

Impact Assessment

The impact of this attack is significant, particularly for organizations that rely on SMS-based OTPs for multi-factor authentication.

  • MFA Bypass: The attack allows threat actors to bypass a common security layer, enabling account takeover for corporate email, VPN, financial services, and other critical applications.
  • Data Breach: Attackers gain access to the content of SMS messages, which can include sensitive personal or business communications, appointment reminders, and other private information.
  • Credential Theft: Beyond OTPs, the malware can use its other RAT capabilities to steal passwords and other credentials stored on the compromised PC.
  • Shift in Defense Focus: This attack highlights a weakness in the security model of applications that sync sensitive data across devices. It forces defenders to consider the PC as a potential point of compromise for mobile data.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were provided in the source articles.

Cyber Observables — Hunting Hints

Security teams can hunt for this activity by monitoring for suspicious access to Phone Link data.

Type
File Path
Value
%LocalAppData%\Packages\Microsoft.YourPhone_*\LocalState\*.db
Description
Monitor for unusual processes accessing the Phone Link SQLite database files. Legitimate access should only come from Phone Link processes.
Type
Process Name
Value
YourPhone.exe, PhoneExperienceHost.exe
Description
Baseline the normal behavior of these processes. Alert on child processes that are not standard Windows components.
Type
Command Line Pattern
Value
*ScreenConnect*
Description
The initial vector was linked to a fake ScreenConnect update. Monitor for suspicious installers or scripts invoking this name.

Detection & Response

  1. Endpoint Monitoring: Use an EDR solution to monitor for suspicious processes accessing the Phone Link database path. Any process other than YourPhone.exe or PhoneExperienceHost.exe reading this file is highly suspect. This aligns with D3FEND's Decoy File concept if a canary file is placed in the directory.
  2. Behavioral Analysis: Look for behaviors associated with RATs, such as unexpected network connections, screen recording API calls, or shell command execution originating from unusual processes. Reference D3FEND's User Behavior Analysis.
  3. Limit Application Usage: In high-security environments, consider using Group Policy to restrict or disable the use of the Microsoft Phone Link application on corporate devices.

Mitigation

  1. Phishing-Resistant MFA: The most effective mitigation is to move away from SMS-based MFA. Transition to more secure methods like FIDO2/WebAuthn security keys or authenticator apps that use push notifications with number matching. These methods are not vulnerable to this type of interception.
  2. Endpoint Security: Ensure all endpoints are protected with a modern EDR and antivirus solution capable of detecting and blocking RATs like CloudZ.
  3. User Education: While the attack targets the PC, user awareness about fake software updates and suspicious installers can help prevent the initial compromise.
  4. Application Hardening: As a D3FEND Application Configuration Hardening measure, if Phone Link is not a business-critical application, use application control policies to block its execution on enterprise assets.

Timeline of Events

1
January 1, 2026
Cisco Talos first observes the malware campaign activity.
2
May 5, 2026
Cisco Talos and other media outlets publish details of the CloudZ and Pheno malware.
3
May 5, 2026
This article was published

MITRE ATT&CK Mitigations

Move away from interceptable MFA methods like SMS. Implement phishing-resistant MFA such as FIDO2 security keys.

Use EDR tools to detect and block abnormal behaviors, such as a non-Phone Link process accessing the Phone Link database.

If Microsoft Phone Link is not required for business purposes, disable or uninstall it via Group Policy to eliminate this attack surface.

Deploy and maintain endpoint protection to detect and quarantine the CloudZ RAT.

D3FEND Defensive Countermeasures

This attack specifically targets and defeats a weak form of MFA (SMS OTPs). The most critical countermeasure is to upgrade the organization's authentication standards. Mandate the use of phishing-resistant MFA for all users, especially for access to VPN, email, and critical applications. The gold standard is FIDO2/WebAuthn hardware security keys. A strong alternative is the use of authenticator apps that provide push notifications with number matching, which requires user interaction on the trusted device and is not susceptible to the passive interception demonstrated by CloudZ. By removing the reliance on SMS, this entire attack chain is rendered ineffective for the purpose of account takeover.

To detect the CloudZ RAT's activity on a compromised host, security teams should leverage an EDR solution to perform detailed process analysis. Specifically, create detection rules that monitor for any process other than YourPhone.exe or PhoneExperienceHost.exe attempting to read or access files within the %LocalAppData%\Packages\Microsoft.YourPhone_*\ directory. This is a highly specific and anomalous behavior. Furthermore, baseline the typical behavior of the legitimate Phone Link processes and alert on any deviations, such as spawning unusual child processes (e.g., cmd.exe, powershell.exe) or making network connections to uncategorized IP addresses. This focused monitoring can identify the Pheno plugin's core function and expose the RAT.

Timeline of Events

1
January 1, 2026

Cisco Talos first observes the malware campaign activity.

2
May 5, 2026

Cisco Talos and other media outlets publish details of the CloudZ and Pheno malware.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CloudZPhenoMicrosoft Phone LinkMFAOTPCisco TalosRAT

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.