Researchers at Cisco Talos have identified a new campaign utilizing a remote access tool (RAT) called CloudZ that employs a novel technique to bypass multi-factor authentication (MFA). Active since at least January 2026, the attack leverages a custom plugin named "Pheno" to abuse the legitimate Microsoft Phone Link application in Windows 10 and 11. By compromising a victim's PC, the malware can access a local database where Phone Link stores synchronized data from a connected mobile device. This allows the attacker to steal sensitive information, including SMS messages and one-time passwords (OTPs), directly from the PC. This method is particularly dangerous because it completely bypasses the security of the mobile device, requiring no malware or exploits on the phone itself.
The attack is a multi-stage process designed for stealth and credential theft:
PhoneExperiences-*.db) created by the application on the PC.This attack vector highlights a critical weakness in the trust relationship between synced devices. A compromise on the less-secure device (the PC) can lead to the full compromise of data from the more-secure device (the phone).
The core of this attack is the abuse of a legitimate feature. Microsoft Phone Link stores a cache of synchronized data in a local SQLite database located on the user's PC. The Pheno plugin is simply programmed to locate and read this file. The path to the database is typically within the user's local application data folder, for example:
C:\Users\<username>\AppData\Local\Packages\Microsoft.YourPhone_...\LocalState\PhoneExperiences-*.db
By targeting this file, the attackers avoid the complexities of developing and deploying mobile malware for Android or iOS. They don't need to overcome mobile operating system security, app store restrictions, or device-specific exploits. The entire attack is contained on the Windows host, which is often an easier target.
The CloudZ RAT itself is designed for evasion. It performs checks for debuggers and virtualized environments (T1497 - Virtualization/Sandbox Evasion) and executes its malicious functions in memory to avoid leaving traces on disk.
T1204.002 - User Execution: Malicious File: Initial infection relies on the user running a fake software update.T1610 - Steal Application Access Token: The ultimate goal is to use stolen OTPs to gain unauthorized access.T1560.001 - Archive Collected Data: Archive via Utility: Data from the SQLite database is collected before exfiltration.T1056.001 - Input Capture: Keylogging: While not keylogging, this is conceptually similar—stealing user input (OTPs) from an alternate channel.T1539 - Steal Web Session Cookie: The theft of OTPs is a means to hijack authenticated sessions.T1497 - Virtualization/Sandbox Evasion: CloudZ RAT performs checks to avoid analysis environments.The primary impact of this attack is the complete bypass of SMS-based and notification-based two-factor authentication (2FA). An attacker who has already compromised a user's primary credentials (e.g., through a separate phishing attack) can now defeat the second factor of authentication and gain full access to sensitive accounts, such as email, banking, or corporate VPNs. This significantly increases the risk of account takeover and subsequent data breaches or financial loss. The attack undermines user confidence in 2FA and demonstrates that the security of synchronized data is only as strong as the least secure device in the chain.
PhoneExperienceHost.exe attempting to access the PhoneExperiences-*.db file. EDR solutions can be configured to alert on this anomalous file access pattern.New hunting hints and detailed MITRE ATT&CK mappings provided for the CloudZ RAT campaign, including specific file paths and process names for detection.
Move away from SMS-based MFA. Implement stronger forms of MFA, such as authenticator apps (TOTP) or phishing-resistant hardware keys (FIDO2/WebAuthn), which are not vulnerable to this interception technique.
Mapped D3FEND Techniques:
If Microsoft Phone Link is not a business-critical application, disable or uninstall it via policy to eliminate the attack surface.
Mapped D3FEND Techniques:
Train users to identify and report suspicious software updates and phishing attempts. Specifically, teach them to only install updates from official, built-in application mechanisms.
Use an EDR solution to monitor for and block anomalous behavior, such as a non-Microsoft process attempting to read the Phone Link SQLite database.
The CloudZ RAT attack is a textbook example of why SMS-based OTPs are no longer considered a secure second factor. The most effective countermeasure is to migrate all users and systems to stronger, phishing-resistant MFA methods. Prioritize the adoption of FIDO2/WebAuthn-compliant hardware security keys (like YubiKeys) for privileged users and critical applications. For broader user populations, enforce the use of Time-based One-Time Password (TOTP) authenticator apps (e.g., Microsoft Authenticator, Google Authenticator). Unlike SMS, which can be intercepted as shown in this attack, TOTP codes are generated and displayed entirely on the device and are not transmitted over an insecure channel. This single change completely invalidates the primary goal of the CloudZ RAT's Pheno plugin.
To specifically counter the Pheno plugin's technique, EDR and host-based security systems can be configured to enforce stricter local file permissions and monitoring on the Phone Link database. Create a detection rule that alerts whenever any process except the legitimate PhoneExperienceHost.exe attempts to read the PhoneExperiences-*.db file. This is a highly specific and low-false-positive indicator of compromise. While an attacker with user-level privileges can typically read files in the user's AppData directory, a modern EDR can treat this specific file as a honeypot token. Alerting on unauthorized read access would detect the CloudZ RAT's reconnaissance and theft activity in real-time, allowing for a swift incident response before OTPs are successfully exfiltrated and used.
A simple and highly effective hardening measure is to control the presence of the Microsoft Phone Link application itself. For corporate environments, if cross-device synchronization is not a business requirement, use endpoint management tools (like Intune or Group Policy) to uninstall or block the Phone Link application across the enterprise. This removes the vulnerable component and its associated data store (PhoneExperiences-*.db) from the endpoint entirely, making the Pheno plugin useless. This approach follows the security principle of minimizing the attack surface. By removing unnecessary applications, you eliminate not only their known vulnerabilities but also the potential for them to be abused in unforeseen ways, as demonstrated by this attack.
The CloudZ RAT campaign using the Pheno plugin is assessed to have begun.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.