CloudZ RAT abuses Microsoft Phone Link via Pheno plugin for credential and OTP theft
Summary
Hide ▲
Show ▼
Threat actors have leveraged the CloudZ remote access trojan (RAT) and a custom Pheno plugin to hijack Microsoft Phone Link functionality in Windows for credential and one-time password (OTP) theft. The attack chain abuses the legitimate PC-to-phone sync feature to monitor active Phone Link processes, intercept SMS and OTPs, and exfiltrate synchronized mobile data without requiring mobile device compromise. The intrusion has been active since at least January 2026, with no attributed threat actor. The technique bypasses two-factor authentication by targeting cross-device synchronization data stored on the Windows host.
Timeline
-
06.05.2026 11:34 1 articles · 4h ago
CloudZ RAT with Pheno plugin abuses Microsoft Phone Link for credential and OTP theft since January 2026
A modular CloudZ RAT deployment has been observed since at least January 2026 using a custom Pheno plugin to hijack Microsoft Phone Link functionality on Windows hosts. The plugin monitors Phone Link processes and exfiltrates synchronized mobile data—including SMS and OTPs—directly from the Windows environment without requiring mobile compromise. The attack chain begins with a fake ConnectWise ScreenConnect executable delivering a .NET loader that establishes persistence via a scheduled task and deploys CloudZ after environment checks. The trojan communicates with C2 using encrypted sockets and accepts Base64-encoded instructions to conduct credential theft, browser data exfiltration, file operations, screen recording, and plugin management.
Show sources
- Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs — thehackernews.com — 06.05.2026 11:34
Information Snippets
-
CloudZ RAT uses a custom Pheno plugin to hijack the Microsoft Phone Link application, enabling monitoring of synchronized mobile data including SMS and OTPs directly from the Windows host.
First reported: 06.05.2026 11:341 source, 1 articleShow sources
- Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs — thehackernews.com — 06.05.2026 11:34
-
Phone Link is a built-in Windows feature (Windows 10/11) that synchronizes data between a PC and mobile device via Wi-Fi/Bluetooth to enable calls, messages, and notifications management.
First reported: 06.05.2026 11:341 source, 1 articleShow sources
- Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs — thehackernews.com — 06.05.2026 11:34
-
Initial access was achieved via an undocumented method delivering a fake ConnectWise ScreenConnect executable, which acts as a downloader for a .NET-based loader.
First reported: 06.05.2026 11:341 source, 1 articleShow sources
- Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs — thehackernews.com — 06.05.2026 11:34
-
The loader establishes persistence via a scheduled task and performs hardware/environment checks before deploying the modular CloudZ trojan.
First reported: 06.05.2026 11:341 source, 1 articleShow sources
- Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs — thehackernews.com — 06.05.2026 11:34
-
CloudZ trojan supports 20+ commands including credential exfiltration, browser data collection, Phone Link recon, plugin management, file operations, screen recording, and C2 communication.
First reported: 06.05.2026 11:341 source, 1 articleShow sources
- Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs — thehackernews.com — 06.05.2026 11:34
-
Pheno plugin performs reconnaissance on the Phone Link application, writes data to a staging folder, and CloudZ exfiltrates this data to its C2 server for further exploitation.
First reported: 06.05.2026 11:341 source, 1 articleShow sources
- Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs — thehackernews.com — 06.05.2026 11:34
-
Intrusion activity has been observed since at least January 2026, with no public attribution to a known threat actor or group.
First reported: 06.05.2026 11:341 source, 1 articleShow sources
- Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs — thehackernews.com — 06.05.2026 11:34