Security researchers at Elastic Security Labs have uncovered a sophisticated new Windows backdoor named NANOREMOTE. This C++ based malware employs a stealthy command-and-control (C2) technique, leveraging the legitimate Google Drive API to receive commands and exfiltrate data. This method allows the malware's traffic to be camouflaged within normal, encrypted cloud service activity, making it exceptionally difficult to detect with traditional network-based intrusion detection systems. NANOREMOTE exhibits functional similarities to the FINALDRAFT implant and appears to be part of an evolving toolset used by threat actors. Its capabilities include reconnaissance, remote command execution, and a robust file transfer management system, posing a significant threat to enterprises that rely on cloud services.
NANOREMOTE represents a growing trend of malware abusing legitimate online services (also known as Living Off the Trusted Site - LOTS) for C2 operations. By using the Google Drive API, the threat actor can:
google.com), bypassing reputation-based blocklists and making it hard to distinguish from benign user activity.Elastic Security Labs discovered a sample of NANOREMOTE uploaded to VirusTotal from the Philippines on October 3, 2025. This sample was found in a file named wmsetup.log, a filename also associated with the PATHLOADER malware, which has been used to deploy FINALDRAFT. This connection suggests that the actors behind NANOREMOTE may be the same as or collaborating with those using the FINALDRAFT toolset.
NANOREMOTE is a modular backdoor with a comprehensive feature set designed for stealth and control.
T1071.001 - Application Layer Protocol: Web Protocols: The underlying communication uses HTTPS.T1102.002 - Web Service: Bidirectional Communication: The core TTP. The malware uses Google Drive as a C2 channel, abusing a legitimate web service.T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage: Stolen data is uploaded to the attacker's Google Drive account.T1059 - Command and Scripting Interpreter: The backdoor is capable of executing received commands and scripts.T1027 - Obfuscated Files or Information: The malware is likely packed or obfuscated to avoid static analysis.The use of legitimate cloud services for C2 poses a major challenge for security teams. For businesses, especially the millions that use Google Workspace, this tactic blurs the line between malicious and legitimate network traffic. A successful NANOREMOTE infection could lead to long-term, undetected data exfiltration, corporate espionage, and the deployment of further malware like ransomware. The difficulty in detection means the malware could dwell in a network for an extended period, giving attackers ample time to achieve their objectives.
Detecting malware like NANOREMOTE requires shifting focus from traditional network signatures to behavioral analysis and API monitoring.
Detection Strategies:
*.googleapis.com. While many legitimate applications do this, a process that has no business using cloud storage (e.g., a non-browser system process) making these connections is highly suspicious.wmsetup.log from running in the first place.*.googleapis.com and *.google.com.Block access to cloud storage services from servers and systems that do not require it.
Mapped D3FEND Techniques:
Use EDR to detect anomalous processes making network connections to cloud APIs.
To counter NANOREMOTE's abuse of Google Drive, organizations must implement intelligent outbound traffic filtering. While blocking Google entirely is not feasible for many, context-aware filtering is key. Create strict firewall and proxy rules for servers and infrastructure that have no legitimate business reason to access consumer cloud services. For user endpoints, use a Cloud Access Security Broker (CASB) or Secure Web Gateway (SWG) to differentiate between corporate-sanctioned Google Workspace instances and personal Google Drive accounts. Block uploads to any non-corporate Google Drive. Furthermore, create policies that alert on processes other than approved Google clients or web browsers making API calls to www.googleapis.com. This layered approach to filtering makes it much harder for the malware's C2 traffic to blend in.
Since NANOREMOTE mimics legitimate user activity, User Behavior Analytics (UBA) is a critical detection technique. Integrate logs from your EDR, Google Workspace, and network devices into a UBA platform or SIEM. Establish a baseline of normal Google Drive API usage for each user and process. The system should then alert on deviations from this baseline. For example, a background process on a user's machine that has never accessed Google Drive before suddenly starts making periodic API calls, or a user's account starts uploading data at unusual times (e.g., 3 AM) or from a new geographic location. These anomalies, which are invisible to signature-based tools, are strong indicators of a compromised account or endpoint being used by NANOREMOTE for C2.
At the endpoint level, process analysis can unmask NANOREMOTE's activity. Deploy EDR agents to monitor all running processes and their network connections. Create a specific detection rule to flag any process that is not an official Google Drive client or a standard web browser making persistent connections to Google API domains (*.googleapis.com). The discovery of the malware in a file named wmsetup.log provides a tangible indicator. Hunt for this filename across all systems. More broadly, focus on the context: a process running from a temporary directory or with a generic name that is communicating with Google Drive is highly suspicious. Correlating this process activity with file creation events (e.g., the creation of wmsetup.log) can provide a high-confidence alert for NANOREMOTE infection.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats