A sophisticated phishing campaign is leveraging the trusted reputation of the Vercel cloud platform and the Telegram messaging service to deliver a Remote Access Trojan (RAT). According to a report from Cloudflare, attackers are hosting phishing pages on *.vercel.app subdomains to bypass email security gateways. The campaign uses financial-themed lures to entice victims. A key innovation is the use of a Telegram-gated mechanism, where the victim must interact with a Telegram channel or bot to download the final payload. This acts as a human-verification step, effectively evading automated analysis systems. The payload is an installer for GoTo Resolve, a legitimate remote access tool, which is then abused by the attackers to gain persistent control over the victim's machine.
The campaign, active from late 2025 to early 2026, demonstrates a growing trend of attackers abusing legitimate cloud services to enhance their operations. The attack chain is as follows:
*.vercel.app domain.vercel.app is a legitimate and widely used domain, the URL is less likely to be flagged as malicious by email security filters. This is an example of T1588.002 - Tool where attackers abuse a legitimate tool/service.This multi-stage, multi-platform approach significantly increases the attack's complexity and its ability to evade detection.
This campaign combines several techniques to achieve its goals:
T1566.002 - Spearphishing Link. The attack begins with a standard phishing email.T1036.007 - Double File Extension at a conceptual level, by hiding behind a trusted service. The Telegram gating is a sophisticated form of T1480.001 - Environmental Keying, as the payload is only delivered if the 'environment' (a human with a Telegram account) is correct.T1219 - Remote Access Software. By using a legitimate, signed application, they bypass EDR/antivirus detections that look for known malicious RATs.The use of Telegram as a filter is a clever evolution. It forces a human interaction that automated systems cannot replicate, ensuring a higher quality of victim and a lower rate of detection for the attackers' payload infrastructure.
While the initial payload is a legitimate tool, the impact is equivalent to a full RAT infection.
| Type | Value | Description |
|---|---|---|
url_pattern |
*.vercel.app |
While many Vercel sites are legitimate, outbound traffic to newly created or suspicious-looking Vercel subdomains should be scrutinized. |
process_name |
GoToResolve.exe |
The installation or execution of GoTo Resolve (or similar remote access tools like AnyDesk, TeamViewer) in an environment where it is not standard software is a major red flag. |
network_traffic_pattern |
Outbound traffic to api.telegram.org |
While not inherently malicious, an employee's machine making API calls to Telegram, especially if initiated from a browser after visiting a Vercel link, could be part of this attack chain. |
log_source |
Email Gateway Logs |
Hunt for emails containing *.vercel.app links, especially those with financial keywords like 'invoice', 'payment', or 'shipping'. |
api.telegram.org from corporate workstations if Telegram is not an approved business application. While this may have business impact, it can be effective.Response: If an unauthorized remote access tool is found, isolate the host, uninstall the software, and investigate system logs and network traffic to determine what actions the attacker took.
Use application control or allowlisting to prevent users from installing unauthorized software, including legitimate but abused remote access tools.
Educate users to identify red flags in phishing campaigns, such as being asked to download software or join a messaging channel to view a document.
Block outbound connections to services like Telegram if they are not approved for business use, preventing the attack chain from completing.
Remove local administrator privileges from standard users to prevent them from installing software.
The most direct technical countermeasure to this attack is executable allowlisting, a form of application control. By creating a policy that only allows known, approved applications to run, the unauthorized installation of GoTo Resolve would be blocked, regardless of whether the user was tricked into downloading it. This defense breaks the attack chain at the execution stage. Implementing a full allowlisting solution can be complex, so organizations can start with a more manageable approach: using tools like Windows Defender Application Control or AppLocker to create policies that block the installation of software from user-writable directories (like Downloads or AppData) and specifically denylisting common but unapproved remote access tools (AnyDesk, TeamViewer, GoTo Resolve, etc.). This provides a significant security uplift by preventing the execution of the attacker's chosen payload.
Hardening the configuration of web browsers can help mitigate the initial stages of this attack. Configure browsers to block or warn users about downloads of executable files. Additionally, IT policies should be enforced to remove local administrator privileges from standard user accounts. This single change prevents a user from being able to install most software, including the GoTo Resolve package used in this attack. Even if the user downloads the installer, they will be met with a UAC prompt requiring administrative credentials, which they do not have. This forces the user to stop and contact IT, often revealing the phishing attempt in the process. This simple, low-cost configuration change is one of the most effective defenses against user-initiated malware execution.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats