New CloudZ RAT Campaign Abuses Microsoft Phone Link to Steal OTPs Without Infecting Mobile Device

CloudZ RAT Exploits Windows Phone Link to Intercept SMS and OTPs from Phones

HIGH
May 6, 2026
May 7, 2026
5m read
MalwarePhishingThreat Intelligence

Related Entities(initial)

Organizations

Products & Tech

Microsoft Phone LinkConnectWise ScreenConnectWindows 10Windows 11

Other

CloudZ RATPheno

Full Report(when first published)

Executive Summary

Researchers at Cisco Talos have identified a new campaign utilizing a remote access tool (RAT) called CloudZ that employs a novel technique to bypass multi-factor authentication (MFA). Active since at least January 2026, the attack leverages a custom plugin named "Pheno" to abuse the legitimate Microsoft Phone Link application in Windows 10 and 11. By compromising a victim's PC, the malware can access a local database where Phone Link stores synchronized data from a connected mobile device. This allows the attacker to steal sensitive information, including SMS messages and one-time passwords (OTPs), directly from the PC. This method is particularly dangerous because it completely bypasses the security of the mobile device, requiring no malware or exploits on the phone itself.


Threat Overview

The attack is a multi-stage process designed for stealth and credential theft:

  1. Initial Access: The victim is tricked into executing a malicious file disguised as a legitimate update for ConnectWise ScreenConnect. This file acts as a dropper.
  2. RAT Deployment: The dropper installs the CloudZ RAT on the Windows machine. CloudZ includes anti-analysis features like in-memory execution and sandbox detection to evade discovery.
  3. Plugin Activation: The RAT deploys the "Pheno" plugin, which is specifically designed to target Microsoft Phone Link.
  4. Data Interception: The Pheno plugin continuously monitors for an active Phone Link connection. When a phone is synced, the plugin accesses the local SQLite database file (PhoneExperiences-*.db) created by the application on the PC.
  5. Theft of Sensitive Data: By reading this database, the malware can access the content of all synchronized SMS messages and application notifications. This includes OTPs sent for two-factor authentication, password reset links, and other sensitive communications.
  6. Exfiltration: The stolen data is then sent by the CloudZ RAT to a command-and-control (C2) server.

This attack vector highlights a critical weakness in the trust relationship between synced devices. A compromise on the less-secure device (the PC) can lead to the full compromise of data from the more-secure device (the phone).

Technical Analysis

The core of this attack is the abuse of a legitimate feature. Microsoft Phone Link stores a cache of synchronized data in a local SQLite database located on the user's PC. The Pheno plugin is simply programmed to locate and read this file. The path to the database is typically within the user's local application data folder, for example: C:\Users\<username>\AppData\Local\Packages\Microsoft.YourPhone_...\LocalState\PhoneExperiences-*.db

By targeting this file, the attackers avoid the complexities of developing and deploying mobile malware for Android or iOS. They don't need to overcome mobile operating system security, app store restrictions, or device-specific exploits. The entire attack is contained on the Windows host, which is often an easier target.

The CloudZ RAT itself is designed for evasion. It performs checks for debuggers and virtualized environments (T1497 - Virtualization/Sandbox Evasion) and executes its malicious functions in memory to avoid leaving traces on disk.

MITRE ATT&CK Techniques Observed:

Impact Assessment

The primary impact of this attack is the complete bypass of SMS-based and notification-based two-factor authentication (2FA). An attacker who has already compromised a user's primary credentials (e.g., through a separate phishing attack) can now defeat the second factor of authentication and gain full access to sensitive accounts, such as email, banking, or corporate VPNs. This significantly increases the risk of account takeover and subsequent data breaches or financial loss. The attack undermines user confidence in 2FA and demonstrates that the security of synchronized data is only as strong as the least secure device in the chain.

Detection & Response

  • File Analysis (D3-FA): Monitor for any process other than the legitimate PhoneExperienceHost.exe attempting to access the PhoneExperiences-*.db file. EDR solutions can be configured to alert on this anomalous file access pattern.
  • Behavioral Analysis: Look for fake ConnectWise ScreenConnect update executables. Any ScreenConnect update should come directly from the application's official update mechanism, not from a downloaded file.
  • Process Analysis (D3-PA): The CloudZ RAT attempts to hide from analysis. Hunt for unsigned processes making network connections, especially those that perform anti-VM or anti-debugging checks upon execution.
  • Endpoint Protection: Ensure antivirus and EDR solutions are up-to-date to detect the CloudZ RAT and its components.

Mitigation

  • Disable Phone Link: The most direct mitigation is to disable or uninstall the Microsoft Phone Link application if it is not essential for business purposes. This removes the attack surface entirely.
  • Move Beyond SMS OTPs: This attack highlights the inherent weakness of SMS-based OTPs. Organizations and individuals should prioritize the use of more secure MFA methods:
    • Authenticator Apps: Use apps like Google Authenticator or Microsoft Authenticator that generate time-based codes on the device itself.
    • Hardware Keys: The most secure option is to use FIDO2/WebAuthn-compliant hardware security keys (e.g., YubiKey).
  • User Education: Train users to be suspicious of unsolicited software updates and to only download software from official vendor websites or trusted application stores.
  • Principle of Least Privilege: Ensure users do not run with administrative privileges on their daily workstations, which can limit the ability of malware like CloudZ RAT to install and persist.

Timeline of Events

1
January 1, 2026
The CloudZ RAT campaign using the Pheno plugin is assessed to have begun.
2
May 6, 2026
This article was published

Article Updates

May 7, 2026

New hunting hints and detailed MITRE ATT&CK mappings provided for the CloudZ RAT campaign, including specific file paths and process names for detection.

MITRE ATT&CK Mitigations

Move away from SMS-based MFA. Implement stronger forms of MFA, such as authenticator apps (TOTP) or phishing-resistant hardware keys (FIDO2/WebAuthn), which are not vulnerable to this interception technique.

Mapped D3FEND Techniques:

If Microsoft Phone Link is not a business-critical application, disable or uninstall it via policy to eliminate the attack surface.

Mapped D3FEND Techniques:

Train users to identify and report suspicious software updates and phishing attempts. Specifically, teach them to only install updates from official, built-in application mechanisms.

Use an EDR solution to monitor for and block anomalous behavior, such as a non-Microsoft process attempting to read the Phone Link SQLite database.

D3FEND Defensive Countermeasures

The CloudZ RAT attack is a textbook example of why SMS-based OTPs are no longer considered a secure second factor. The most effective countermeasure is to migrate all users and systems to stronger, phishing-resistant MFA methods. Prioritize the adoption of FIDO2/WebAuthn-compliant hardware security keys (like YubiKeys) for privileged users and critical applications. For broader user populations, enforce the use of Time-based One-Time Password (TOTP) authenticator apps (e.g., Microsoft Authenticator, Google Authenticator). Unlike SMS, which can be intercepted as shown in this attack, TOTP codes are generated and displayed entirely on the device and are not transmitted over an insecure channel. This single change completely invalidates the primary goal of the CloudZ RAT's Pheno plugin.

To specifically counter the Pheno plugin's technique, EDR and host-based security systems can be configured to enforce stricter local file permissions and monitoring on the Phone Link database. Create a detection rule that alerts whenever any process except the legitimate PhoneExperienceHost.exe attempts to read the PhoneExperiences-*.db file. This is a highly specific and low-false-positive indicator of compromise. While an attacker with user-level privileges can typically read files in the user's AppData directory, a modern EDR can treat this specific file as a honeypot token. Alerting on unauthorized read access would detect the CloudZ RAT's reconnaissance and theft activity in real-time, allowing for a swift incident response before OTPs are successfully exfiltrated and used.

A simple and highly effective hardening measure is to control the presence of the Microsoft Phone Link application itself. For corporate environments, if cross-device synchronization is not a business requirement, use endpoint management tools (like Intune or Group Policy) to uninstall or block the Phone Link application across the enterprise. This removes the vulnerable component and its associated data store (PhoneExperiences-*.db) from the endpoint entirely, making the Pheno plugin useless. This approach follows the security principle of minimizing the attack surface. By removing unnecessary applications, you eliminate not only their known vulnerabilities but also the potential for them to be abused in unforeseen ways, as demonstrated by this attack.

Timeline of Events

1
January 1, 2026

The CloudZ RAT campaign using the Pheno plugin is assessed to have begun.

Sources & References(when first published)

Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs
The Hacker News (thehackernews.com) May 6, 2026
CloudZ RAT potentially steals OTP messages using Pheno plugin
Cisco Talos (blog.talosintelligence.com) May 5, 2026
Your Phone Link setup on Windows could be at risk from this Trojan
Android Authority (androidauthority.com) May 6, 2026
CloudZ RAT Exploits Microsoft Phone Link to Steal OTPs
Expert In the Cloud (expertinthe.cloud) May 5, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CloudZ RATPhenoMicrosoft Phone LinkOTP Theft2FA BypassMalwareCisco Talos

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.