Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

CloudSorcerer (APT) – Threat Actor

January 28, 2025
Reading Time: 5 mins read
in APT, Threat Actors
CloudSorcerer  (APT) – Threat Actor

CloudSorcerer

Date of initial activity

2024

Location 

Unknown

Suspected Attribution 

Cybercriminals

Motivation

Data Theft
Financial Gain

Associated Tools

Cloud Service Platforms: Microsoft Azure and Amazon Web Services (AWS)


Custom Malware


C2 (Command and Control) Frameworks 


PowerShell and Scripting


LanguagesCredential Dumping Tools


Remote Access Tools (RATs)


Encryption and Obfuscation Tools


Browser Extensions and Plugins


File Transfer Protocols


Remote Management Tools

Software

Windows

Overview

In May 2024, a sophisticated new advanced persistent threat (APT) known as CloudSorcerer emerged, specifically targeting Russian government entities. This cyberespionage tool marks a significant evolution in the tactics employed by threat actors, utilizing cloud infrastructure and public services as command and control (C2) servers for stealth monitoring and data exfiltration. Unlike previous APTs, CloudSorcerer is notable for its use of Microsoft Graph, Yandex Cloud, and Dropbox as primary C2 channels, demonstrating a trend towards leveraging legitimate cloud services to mask malicious activities. The architecture of CloudSorcerer is intricately designed, featuring modular components that adapt their functionality based on the processes in which they operate. Upon execution, the malware can assume various roles—acting as a backdoor for data collection or facilitating C2 communications. This multi-faceted approach not only enhances its stealth capabilities but also allows the actor to engage in a wide range of malicious operations, including system reconnaissance, command execution, and data manipulation. Such versatility reflects the sophistication of the threat landscape, where cybercriminals continually refine their methods to evade detection.

Common Targets

Information Public Administration – Russia

Attack vectors

Software Vulnerabilities Phishing

Associated Tools

Cloud Service Platforms:
Microsoft Azure and Amazon Web Services (AWS): CloudSorcerer utilizes these platforms for hosting malicious payloads, leveraging legitimate cloud infrastructure to obfuscate its activities. Custom MalwareC2 (Command and Control) Frameworks: CloudSorcerer often uses custom C2 frameworks that enable secure communication with compromised devices. These frameworks can leverage cloud services for data exfiltration and command execution.
PowerShell and Scripting Languages:
The APT frequently employs PowerShell scripts to execute commands, automate tasks, and manage the compromised environment. This allows for stealthy execution and manipulation of the system.
Credential Dumping Tools:
Tools for extracting credentials from memory or system stores, which can include utilities like Mimikatz or similar credential harvesting mechanisms, are often utilized to escalate privileges and gain further access.
Remote Access Tools (RATs):
CloudSorcerer may deploy custom or publicly available RATs to maintain remote control over compromised systems, facilitating data exfiltration and further exploitation.
Encryption and Obfuscation Tools:
To evade detection and analysis, CloudSorcerer often uses encryption and obfuscation techniques for its payloads, making it difficult for security solutions to identify malicious activities.
Browser Extensions and Plugins:
The APT may create malicious browser extensions to capture user data or perform actions on behalf of the user, further facilitating its espionage objectives.
File Transfer Protocols:
Various protocols (e.g., FTP, SFTP) may be employed to transfer files to and from compromised systems, particularly when exfiltrating sensitive data.
Remote Management Tools:
Tools like RDP (Remote Desktop Protocol) and other remote management solutions might be used to access and control infected machines directly.

How they work

At the core of CloudSorcerer’s operation is its modular architecture, which allows it to perform a variety of malicious tasks depending on its environment. Upon deployment, the malware executes a series of processes designed to evade detection while maintaining control over compromised systems. One of the key components of this architecture is its use of Microsoft Graph, Yandex Cloud, and Dropbox as command and control (C2) channels. By utilizing these widely trusted platforms, CloudSorcerer obscures its communication and management activities, making it difficult for security teams to identify malicious traffic. The malware’s initial phase often involves communication through a GitHub repository that serves as a façade for its activities. This repository contains links to seemingly innocuous public projects, which creates an air of legitimacy. Once a target is compromised, CloudSorcerer retrieves encoded commands from the cloud, allowing it to adapt its functionality based on the operational requirements of the compromised system. This flexibility enables the APT to perform actions such as system reconnaissance, data exfiltration, and even remote command execution without raising suspicion. One particularly concerning feature of CloudSorcerer is its ability to exfiltrate sensitive data from compromised systems. By integrating with public cloud storage services, the malware can transfer stolen information discreetly, further obscuring its activities. The data is often encrypted before transmission, making it challenging for network monitoring tools to identify and block the exfiltration attempts. This method not only enhances the effectiveness of data theft but also complicates forensic analysis for incident responders, as the malicious data blends in with legitimate cloud traffic. Moreover, CloudSorcerer’s use of legitimate cloud services reflects a broader trend in cyber espionage where threat actors increasingly utilize trusted platforms to conduct their operations. This trend highlights the necessity for organizations to reassess their security postures, as traditional detection methods may fall short against threats that leverage the very infrastructure designed to facilitate collaboration and productivity. In conclusion, CloudSorcerer represents a significant evolution in the tactics employed by APTs, operating through a combination of cloud infrastructure, modular design, and innovative evasion techniques. As cybersecurity professionals continue to grapple with the implications of such advanced threats, a comprehensive understanding of CloudSorcerer’s technical operations is essential for developing effective countermeasures. Enhanced vigilance and proactive strategies will be critical in safeguarding sensitive data and maintaining the integrity of governmental cybersecurity defenses against this sophisticated adversary.

MITRE Tactics and Techniques

Initial Access (T1071):
CloudSorcerer often exploits legitimate public services to gain initial access to target systems. This can include using cloud platforms or repositories to deliver its malware.
Execution (T1203):
The malware executes by leveraging various techniques, such as executing scripts or other binaries within the compromised environment. This can occur through malicious downloads or commands fetched from cloud services.
Persistence (T1547):
CloudSorcerer establishes persistence mechanisms on the compromised systems to ensure its continued presence even after reboots. This may include modifying startup programs or creating scheduled tasks.
Privilege Escalation (T1068):
The malware may seek to elevate its privileges to gain greater control over the target system, enabling it to execute more sensitive actions.
Defense Evasion (T1070):
CloudSorcerer employs techniques to avoid detection by security tools, such as using obfuscation methods or legitimate services to communicate and operate covertly.
Credential Access (T1003):
The APT may attempt to harvest user credentials from the compromised systems, allowing it to expand its access within the target environment.
Discovery (T1083):
CloudSorcerer conducts reconnaissance to identify system configurations, network resources, and potential targets for further exploitation.
Exfiltration (T1041):
The APT uses cloud storage services to exfiltrate sensitive data from compromised systems, often employing encryption to obscure the data during transit.
Command and Control (T1071):
The malware utilizes various communication methods, often leveraging cloud-based services for command and control, making it difficult for defenders to identify malicious traffic.  
References:
  • CloudSorcerer – A new APT targeting Russian government entities
Tags: APTCloudSorcerercyberespionageDropboxGitHubGovernmentMicrosoftMicrosoft GraphPhishingRussiaThreat ActorsVulnerabilitiesYandex Cloud
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Subscribe to our newsletter

    Latest Incidents

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial