{"id":3297,"date":"2026-05-22T10:01:17","date_gmt":"2026-05-22T10:01:17","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/"},"modified":"2026-05-22T10:01:17","modified_gmt":"2026-05-22T10:01:17","slug":"cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/","title":{"rendered":"Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload"},"content":{"rendered":"<div>\n<p><img width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\"><\/p>\n<p>In 2025, we observed pervasive SSH tunnel activity, which has remained active into 2026, affecting many government organizations and commercial companies in Russia and Belarus. Behind some of this activity is Cloud Atlas, a group we <a href=\"https:\/\/securelist.com\/tag\/cloud-atlas\/\" target=\"_blank\" rel=\"noopener\">have known since 2014<\/a>. During our investigation, we identified new tools used by this group, as well as indicators of compromise.<\/p>\n<p>The group is back to sending out archives containing malicious shortcuts that launch PowerShell scripts. This technique is employed in addition to the previously described use of malicious documents, which exploit an old vulnerability in the Microsoft Office Equation Editor process (<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2018-0802\" target=\"_blank\" rel=\"noopener\">CVE-2018-0802<\/a>) to download and execute malicious code. We have observed the use of third-party public utilities (Tor\/SSH\/RevSocks) to gain a foothold in infected systems and create additional backup control channels.<\/p>\n<h2 id=\"technical-details\">Technical details<\/h2>\n<h3 id=\"initial-infection\">Initial infection<\/h3>\n<p>As for the primary compromise, Cloud Atlas remains consistent in using phishing. In the observed campaigns, the attackers emailed a ZIP archive containing an LNK file as an attachment.<\/p>\n<div id=\"attachment_119897\" style=\"width: 1621px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1.png\" class=\"magnificImage\"><img fetchpriority=\"high\" decoding=\"async\" aria-describedby=\"caption-attachment-119897\" class=\"size-full wp-image-119897\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1.png\" alt=\"Malware execution flow\" width=\"1611\" height=\"2048\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1.png 1611w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1-236x300.png 236w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1-806x1024.png 806w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1-768x976.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1-1208x1536.png 1208w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1-275x350.png 275w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1-740x941.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1-220x280.png 220w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184623\/Cloud-Atlas1-708x900.png 708w\" sizes=\"(max-width: 1611px) 100vw, 1611px\"><\/a><\/p>\n<p id=\"caption-attachment-119897\" class=\"wp-caption-text\">Malware execution flow<\/p>\n<\/div>\n<p>Attackers use LNK shortcuts to covertly execute PowerShell scripts hosted on external resources. The command line of the shortcut:<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085019\/cloud-atlas-LNK.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-119923\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085019\/cloud-atlas-LNK-1024x93.png\" alt=\"\" width=\"1024\" height=\"93\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085019\/cloud-atlas-LNK-1024x93.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085019\/cloud-atlas-LNK-300x27.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085019\/cloud-atlas-LNK-768x70.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085019\/cloud-atlas-LNK-1536x139.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085019\/cloud-atlas-LNK-740x67.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085019\/cloud-atlas-LNK-1600x145.png 1600w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085019\/cloud-atlas-LNK-800x72.png 800w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085019\/cloud-atlas-LNK.png 1678w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/a><\/p>\n<p>Example of the PowerShell script downloaded and executed by the shortcut:<\/p>\n<div id=\"attachment_119898\" style=\"width: 662px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184725\/Cloud-Atlas2.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119898\" class=\"size-full wp-image-119898\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184725\/Cloud-Atlas2.png\" alt=\"Example of the PowerShell script downloaded by the shortcut \" width=\"652\" height=\"841\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184725\/Cloud-Atlas2.png 652w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184725\/Cloud-Atlas2-233x300.png 233w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184725\/Cloud-Atlas2-271x350.png 271w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184725\/Cloud-Atlas2-217x280.png 217w\" sizes=\"auto, (max-width: 652px) 100vw, 652px\"><\/a><\/p>\n<p id=\"caption-attachment-119898\" class=\"wp-caption-text\">Example of the PowerShell script downloaded by the shortcut<\/p>\n<\/div>\n<p>Actions performed by the downloaded PowerShell:<\/p>\n<table>\n<tbody>\n<tr>\n<td>Step<\/td>\n<td>Action<\/td>\n<td>Description<\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>\u00a0Drops \u201c$tempfixed.ps1\u201d<\/td>\n<td>Pre-staging: places the main payload locally in advance to ensure an execution capability independent of subsequent network connectivity or C2 availability.<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>Creates \u201cRun\u201d registry key \u201cYandexBrowser_setup\u201d for \u201c$tempfixed.ps1\u201d startup<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22084857\/Cloud-Atlas-HKSU.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119921\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22084857\/Cloud-Atlas-HKSU.png\" alt=\"\" width=\"732\" height=\"202\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22084857\/Cloud-Atlas-HKSU.png 732w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22084857\/Cloud-Atlas-HKSU-300x83.png 300w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\"><\/a><\/p>\n<\/td>\n<td>Early persistence: guarantees execution upon the next logon or reboot. If the script is interrupted during later stages, the payload will still activate automatically.<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>Downloads and drops \u201c$temprar.zip\u201d<br \/>\nExtracts \u201c*.pdf\u201d from the downloaded\u00a0 \u201c$temprar.zip\u201d<\/td>\n<td>Payload delivery: retrieves the decoy archive from the remote server to prepare user-facing content for the distraction phase.<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>Extracts \u201c*.pdf\u201d from the downloaded\u00a0 \u201c$temprar.zip\u201d<\/td>\n<td>Decoy preparation: unpacks the legitimate-looking document so it can be executed silently without requiring user interaction.<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>Opens extracted decoy document \u201c*.pdf\u201d with user\u2019s default software<\/td>\n<td>User distraction: opens a convincing document to maintain user engagement and creates a legitimate workflow appearance to buy additional 30\u2013120 seconds for background operations.<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>Executes\u00a0 \u201ctaskkill.exe \/F \/Im winrar.exe\u201d<\/td>\n<td>Process concealment: terminates the archive extractor to prevent the user from seeing the archive contents or noticing unexpected file extraction activity.<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td>Searches and deletes \u201crar.zip\u201d, \u201c*.pdf.zip\u201d and \u201c*.pdf.lnk\u201d<\/td>\n<td>Anti-forensic cleanup: removes the initial infection artifacts before activating the main payload, reducing the number of disk traces available for incident response or EDR correlation.<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td>Executes\u00a0 \u201c$tempfixed.ps1\u201d<\/td>\n<td>Controlled execution: launches the main payload only after persistence is secured, the user is distracted, and access traces are cleaned up.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4 id=\"fixed-ps1-loader\">Fixed.ps1 (loader)<\/h4>\n<p>The primary purpose of the Fixed.ps1 script is to deliver and install subsequent malware onto the compromised system, specifically VBCloud and PowerShower. Fixed.ps1 establishes persistence (by adding itself to registry Run keys), creates a decoy for the user (by opening a PDF document), and executes the next stages of the attack.<\/p>\n<h4 id=\"fixed-ps1payload-vbcloud-dropper\">Fixed.ps1::Payload (VBCloud dropper)<\/h4>\n<div id=\"attachment_119899\" style=\"width: 864px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184847\/Cloud-Atlas3.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119899\" class=\"size-full wp-image-119899\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184847\/Cloud-Atlas3.png\" alt=\"Example of the fixed.ps1::Payload (VBCloud dropper)\" width=\"854\" height=\"179\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184847\/Cloud-Atlas3.png 854w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184847\/Cloud-Atlas3-300x63.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184847\/Cloud-Atlas3-768x161.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184847\/Cloud-Atlas3-740x155.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184847\/Cloud-Atlas3-800x168.png 800w\" sizes=\"auto, (max-width: 854px) 100vw, 854px\"><\/a><\/p>\n<p id=\"caption-attachment-119899\" class=\"wp-caption-text\">Example of the fixed.ps1::Payload (VBCloud dropper)<\/p>\n<\/div>\n<p>This module functions as a dropper for the VBCloud backdoor. It drops two files onto the infected machine:<\/p>\n<ul>\n<li>video.vbs: the loader of the backdoor,VBCloud::Launcher. This is a VBScript that decrypts the contents of video.mds (typically using RC4 with a hardcoded key) and executes it in memory.<\/li>\n<li>video.mds: the encrypted body of the backdoor, VBCloud::Backdoor. This is the main module that connects to a C2 server to receive additional scripts or execute built-in commands. This backdoor is designed to function as a stealer, specifically targeting files with extensions of interest (such as DOC, PDF, XLS) and exfiltrating them.<\/li>\n<\/ul>\n<h4 id=\"fixed-ps1payload-powershower\">Fixed.ps1::Payload (PowerShower)<\/h4>\n<p>This module installs a second backdoor called PowerShower on the system. We don\u2019t have the specific script that performs this installation, but we assume it\u2019s performed by a script similar to fixed.ps1::Payload (VBCloud dropper).<\/p>\n<p>Unlike VBCloud, which focuses on file theft, PowerShower is primarily used for network reconnaissance and lateral movement within the victim\u2019s infrastructure. PowerShower can perform <a href=\"https:\/\/securelist.com\/cloud-atlas-attacks-with-new-backdoor-vbcloud\/115103\/#powershower\" target=\"_blank\" rel=\"noopener\">the following tasks<\/a>:<\/p>\n<ul>\n<li>Collect information about running processes, administrator groups, and domain controllers.<\/li>\n<li>Download and execute PowerShell scripts from the C2 server.<\/li>\n<li>Conduct \u201cKerberoasting\u201d attacks (stealing password hashes of Active Directory accounts).<\/li>\n<\/ul>\n<p>PowerShower is dropped onto the system via the path \u2018C:Users[username]Picturesgoogleearth.ps1\u2019.<\/p>\n<div id=\"attachment_119900\" style=\"width: 665px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184958\/Cloud-Atlas4.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119900\" class=\"size-full wp-image-119900\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184958\/Cloud-Atlas4.png\" alt=\"Contents of the googleearth.ps1(PowerShower)\" width=\"655\" height=\"571\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184958\/Cloud-Atlas4.png 655w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184958\/Cloud-Atlas4-300x262.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184958\/Cloud-Atlas4-401x350.png 401w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21184958\/Cloud-Atlas4-321x280.png 321w\" sizes=\"auto, (max-width: 655px) 100vw, 655px\"><\/a><\/p>\n<p id=\"caption-attachment-119900\" class=\"wp-caption-text\">Contents of the googleearth.ps1(PowerShower)<\/p>\n<\/div>\n<h3 id=\"powershowerpayload-credential-grabber\">PowerShower::Payload (credential grabber)<\/h3>\n<p>PowerShower downloads an additional script for stealing credentials. It performs the following actions:<\/p>\n<ul>\n<li>Creates a Volume Shadow Copy of the C: drive.<\/li>\n<li>Copies the SAM (stores local user password hashes) and SECURITY system files from this shadow copy to C:UsersPublicDocuments, disguising them as PDF files.<\/li>\n<li>The script is launched in several stages. To execute with high privileges, the script uses a UAC bypass technique via fodhelper.exe (a built-in Windows utility). This allows PowerShell to run as an administrator without directly prompting the user, which could otherwise raise suspicion.<\/li>\n<\/ul>\n<p>The full launch chain looks like this:<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185040\/Cloud-Atlas5.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119901\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185040\/Cloud-Atlas5.png\" alt=\"\" width=\"900\" height=\"117\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185040\/Cloud-Atlas5.png 900w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185040\/Cloud-Atlas5-300x39.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185040\/Cloud-Atlas5-768x100.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185040\/Cloud-Atlas5-740x96.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185040\/Cloud-Atlas5-800x104.png 800w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\"><\/a><\/p>\n<p>The full Base64-decoded script is given below.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185116\/Cloud-Atlas6.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119902\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185116\/Cloud-Atlas6.png\" alt=\"\" width=\"908\" height=\"665\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185116\/Cloud-Atlas6.png 908w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185116\/Cloud-Atlas6-300x220.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185116\/Cloud-Atlas6-768x562.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185116\/Cloud-Atlas6-478x350.png 478w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185116\/Cloud-Atlas6-740x542.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185116\/Cloud-Atlas6-382x280.png 382w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185116\/Cloud-Atlas6-800x586.png 800w\" sizes=\"auto, (max-width: 908px) 100vw, 908px\"><\/a><\/p>\n<h3 id=\"multi-user-rdp-by-patching-termsrv-dll\">Multi-user RDP by patching termsrv.dll<\/h3>\n<p>Moving laterally across the victim\u2019s network, the attackers executed a suspicious PowerShell script named rdp_new.ps1 (MD5 1A11B26DD0261EF27A112CE8B361C247):<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185215\/Cloud-Atlas7.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119903\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185215\/Cloud-Atlas7.png\" alt=\"\" width=\"905\" height=\"59\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185215\/Cloud-Atlas7.png 905w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185215\/Cloud-Atlas7-300x20.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185215\/Cloud-Atlas7-768x50.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185215\/Cloud-Atlas7-740x48.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185215\/Cloud-Atlas7-800x52.png 800w\" sizes=\"auto, (max-width: 905px) 100vw, 905px\"><\/a><\/p>\n<p>The script is designed to allow multiple RDP sessions in Windows 10 by patching the termsrv.dll file. Termsrv.dll is the core Windows library that enforces Remote Desktop Services rules.<\/p>\n<p>By default, Windows limits the number of simultaneous RDP sessions. Removing this restriction allows attackers to operate on the machine in the background without disconnecting the legitimate user, thereby reducing the likelihood of detection.<\/p>\n<p>At first, the script enables RDP on the firewall and downgrades the RDP security settings:<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185251\/Cloud-Atlas8.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119904\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185251\/Cloud-Atlas8.png\" alt=\"\" width=\"912\" height=\"220\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185251\/Cloud-Atlas8.png 912w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185251\/Cloud-Atlas8-300x72.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185251\/Cloud-Atlas8-768x185.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185251\/Cloud-Atlas8-740x179.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185251\/Cloud-Atlas8-800x193.png 800w\" sizes=\"auto, (max-width: 912px) 100vw, 912px\"><\/a><\/p>\n<p>Before modifying termsrv.dll, the script takes ownership and assigns itself full permissions. Then the script finds the sequence of bytes <code>39 81 3C 06 00 00 ?? ?? ?? ?? ?? ??<\/code> and replaces it with <code>B8 00 01 00 00 89 81 38 06 00 00 90<\/code>. After these manipulations, the script restarts the RDP service.<\/p>\n<div id=\"attachment_119905\" style=\"width: 862px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185334\/Cloud-Atlas9.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119905\" class=\"size-full wp-image-119905\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185334\/Cloud-Atlas9.png\" alt=\"Example of script\" width=\"852\" height=\"495\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185334\/Cloud-Atlas9.png 852w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185334\/Cloud-Atlas9-300x174.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185334\/Cloud-Atlas9-768x446.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185334\/Cloud-Atlas9-602x350.png 602w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185334\/Cloud-Atlas9-740x430.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185334\/Cloud-Atlas9-482x280.png 482w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185334\/Cloud-Atlas9-800x465.png 800w\" sizes=\"auto, (max-width: 852px) 100vw, 852px\"><\/a><\/p>\n<p id=\"caption-attachment-119905\" class=\"wp-caption-text\">Example of script<\/p>\n<\/div>\n<p>The patched version allows multiple concurrent logins so attackers can stay connected without disrupting the legitimate user, thereby reducing suspicion.<\/p>\n<h3 id=\"reverse-ssh-tunneling\">Reverse SSH tunneling<\/h3>\n<p>As mentioned above, during this wave of attacks, the adversaries widely deployed reverse SSH tunnels to many hosts of interest. The compromised machine initiates an SSH connection to an attacker-controlled server, which allows attackers to bypass standard firewall rules via establishing outbound connections.<\/p>\n<p>That way, even if the primary backdoor is discovered, the attackers can maintain control through the SSH tunnel.<\/p>\n<p>To install a reverse SSH tunnel on a victim\u2019s host, the attackers run VBS scripts via PAExec or PsExec.<\/p>\n<p>We\u2019ve seen three types of scripts:<\/p>\n<ul>\n<li>Gen.vbs (WriteToSchedulerGenerateKey.vbs) generates key for SSH tunnel.<\/li>\n<li>Run.vbs (WriteToSchedulerRunSSH.vbs) runs reverse SSH tunnel.<\/li>\n<li>Kill.vbs (WriteToSchedulerKillSSH.vbs) stops reverse SSH tunnel via taskkill.exe.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185536\/Cloud-Atlas10.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119906\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185536\/Cloud-Atlas10.png\" alt=\"\" width=\"886\" height=\"121\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185536\/Cloud-Atlas10.png 886w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185536\/Cloud-Atlas10-300x41.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185536\/Cloud-Atlas10-768x105.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185536\/Cloud-Atlas10-740x101.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185536\/Cloud-Atlas10-800x109.png 800w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\"><\/a><\/p>\n<p>To achieve persistence, the attackers added a new scheduled task in Windows:<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185603\/Cloud-Atlas11.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119907\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185603\/Cloud-Atlas11.png\" alt=\"\" width=\"908\" height=\"127\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185603\/Cloud-Atlas11.png 908w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185603\/Cloud-Atlas11-300x42.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185603\/Cloud-Atlas11-768x107.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185603\/Cloud-Atlas11-740x104.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185603\/Cloud-Atlas11-800x112.png 800w\" sizes=\"auto, (max-width: 908px) 100vw, 908px\"><\/a><\/p>\n<p>In some cases, before establishing a reverse SSH tunnel, attackers set new access permissions to the folder containing the private key to prevent the legitimate user or system administrators from easily accessing or modifying it:<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185641\/Cloud-Atlas12.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119908\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185641\/Cloud-Atlas12.png\" alt=\"\" width=\"908\" height=\"83\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185641\/Cloud-Atlas12.png 908w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185641\/Cloud-Atlas12-300x27.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185641\/Cloud-Atlas12-768x70.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185641\/Cloud-Atlas12-740x68.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185641\/Cloud-Atlas12-800x73.png 800w\" sizes=\"auto, (max-width: 908px) 100vw, 908px\"><\/a><\/p>\n<h3 id=\"patched-openssh\">Patched OpenSSH<\/h3>\n<p>Some OpenSSH binaries used by the attackers had their imports modified. Instead of libcrypto.dll, the SSH executable imports syruntime.dll, which was placed in the same folder as the binary. This was likely done to evade detection and ensure stealth.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185709\/Cloud-Atlas13.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119909\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185709\/Cloud-Atlas13.png\" alt=\"\" width=\"910\" height=\"57\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185709\/Cloud-Atlas13.png 910w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185709\/Cloud-Atlas13-300x19.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185709\/Cloud-Atlas13-768x48.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185709\/Cloud-Atlas13-740x46.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185709\/Cloud-Atlas13-800x50.png 800w\" sizes=\"auto, (max-width: 910px) 100vw, 910px\"><\/a><\/p>\n<p>In addition, we found a portable version of OpenSSH, presumably compiled by the adversaries:<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185742\/Cloud-Atlas14.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119910\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185742\/Cloud-Atlas14.png\" alt=\"\" width=\"905\" height=\"55\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185742\/Cloud-Atlas14.png 905w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185742\/Cloud-Atlas14-300x18.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185742\/Cloud-Atlas14-768x47.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185742\/Cloud-Atlas14-740x45.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21185742\/Cloud-Atlas14-800x49.png 800w\" sizes=\"auto, (max-width: 905px) 100vw, 905px\"><\/a><\/p>\n<h3 id=\"revsocks\">RevSocks<\/h3>\n<p>In addition to Reverse SSH tunnels, the attackers installed RevSocks using the same infrastructure. RevSocks is an alternative tool to SSH for establishing tunnels and proxy connections, written in Golang. This tool allows direct connection to workstations on the local network. It also allows attackers to gain access to other segments of the victim\u2019s network by using the machine as a gateway. In some cases, C2 addresses were hardcoded into the binary; in other cases, the C2 was passed in command line arguments.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190006\/Cloud-Atlas15.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119911\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190006\/Cloud-Atlas15.png\" alt=\"\" width=\"904\" height=\"190\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190006\/Cloud-Atlas15.png 904w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190006\/Cloud-Atlas15-300x63.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190006\/Cloud-Atlas15-768x161.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190006\/Cloud-Atlas15-740x156.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190006\/Cloud-Atlas15-800x168.png 800w\" sizes=\"auto, (max-width: 904px) 100vw, 904px\"><\/a><\/p>\n<p>There were also reverse SOCKS samples with hardcoded C2 addresses:<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190038\/Cloud-Atlas16.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119912\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190038\/Cloud-Atlas16.png\" alt=\"\" width=\"903\" height=\"77\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190038\/Cloud-Atlas16.png 903w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190038\/Cloud-Atlas16-300x26.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190038\/Cloud-Atlas16-768x65.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190038\/Cloud-Atlas16-740x63.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190038\/Cloud-Atlas16-800x68.png 800w\" sizes=\"auto, (max-width: 903px) 100vw, 903px\"><\/a><\/p>\n<h3 id=\"tor-tunneling\">Tor tunneling<\/h3>\n<p>To maintain control over the compromised host, the Tor network was used in some cases. A minimal set of a Tor executable and configuration files, necessary for launching HiddenService, was copied to the system directories of infected devices. The name of the Tor Browser executable file was modified. As a result, the infected machine was accessible via RDP from the Tor network when accessing the generated .onion domain.<br \/>\nBelow is an example of a configuration file for routing connections from Tor to RDP ports on the local network, as well as example command lines for logging into Tor.<\/p>\n<div id=\"attachment_119913\" style=\"width: 668px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190111\/Cloud-Atlas17.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119913\" class=\"size-full wp-image-119913\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190111\/Cloud-Atlas17.png\" alt=\"Example of TOR configuration file\" width=\"658\" height=\"258\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190111\/Cloud-Atlas17.png 658w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190111\/Cloud-Atlas17-300x118.png 300w\" sizes=\"auto, (max-width: 658px) 100vw, 658px\"><\/a><\/p>\n<p id=\"caption-attachment-119913\" class=\"wp-caption-text\">Example of TOR configuration file<\/p>\n<\/div>\n<h3><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190145\/Cloud-Atlas18.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119914\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190145\/Cloud-Atlas18.png\" alt=\"\" width=\"910\" height=\"123\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190145\/Cloud-Atlas18.png 910w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190145\/Cloud-Atlas18-300x41.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190145\/Cloud-Atlas18-768x104.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190145\/Cloud-Atlas18-740x100.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190145\/Cloud-Atlas18-800x108.png 800w\" sizes=\"auto, (max-width: 910px) 100vw, 910px\"><\/a><\/h3>\n<h3 id=\"powercloud\">PowerCloud<\/h3>\n<p>We analyzed a new Cloud Atlas tool, PowerCloud. It collects user data with administrator privileges and writes this information to Google Sheets in Base64 format.<\/p>\n<p>The tool represents an obfuscated PowerShell script. In most cases, it is packaged into an executable file using the PS2EXE utility, but we have also encountered variants in the form of a separate PowerShell script.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190220\/Cloud-Atlas19.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119915\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190220\/Cloud-Atlas19.png\" alt=\"\" width=\"908\" height=\"101\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190220\/Cloud-Atlas19.png 908w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190220\/Cloud-Atlas19-300x33.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190220\/Cloud-Atlas19-768x85.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190220\/Cloud-Atlas19-740x82.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190220\/Cloud-Atlas19-800x89.png 800w\" sizes=\"auto, (max-width: 908px) 100vw, 908px\"><\/a><\/p>\n<p>To find administrators on the victim host, the tool executes the following command:<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190250\/Cloud-Atlas20.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119916\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190250\/Cloud-Atlas20.png\" alt=\"\" width=\"911\" height=\"53\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190250\/Cloud-Atlas20.png 911w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190250\/Cloud-Atlas20-300x17.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190250\/Cloud-Atlas20-768x45.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190250\/Cloud-Atlas20-740x43.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190250\/Cloud-Atlas20-800x47.png 800w\" sizes=\"auto, (max-width: 911px) 100vw, 911px\"><\/a><\/p>\n<p>This information is appended with the computer name and current date, the data is encoded in base64, and then the collected data is added to an existing Google Sheet.<\/p>\n<div id=\"attachment_119917\" style=\"width: 614px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190332\/Cloud-Atlas21.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119917\" class=\"size-full wp-image-119917\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190332\/Cloud-Atlas21.png\" alt=\"PowerCloud script\" width=\"604\" height=\"940\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190332\/Cloud-Atlas21.png 604w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190332\/Cloud-Atlas21-193x300.png 193w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190332\/Cloud-Atlas21-225x350.png 225w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190332\/Cloud-Atlas21-180x280.png 180w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190332\/Cloud-Atlas21-578x900.png 578w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\"><\/a><\/p>\n<p id=\"caption-attachment-119917\" class=\"wp-caption-text\">PowerCloud script<\/p>\n<\/div>\n<h3 id=\"browser-checker\">Browser checker<\/h3>\n<p>Additionally, the attackers used another PowerShell script (MD5 5329F7BFF9D0D5DB28821B86C26D628F), compiled into an executable file via PS2EXE, which checks whether browser processes (Chrome, Edge, Firefox, and other) are running. This helps detect when the user is working on the computer. This can be used to choose the optimal time for conducting attacks (for example, when the user is away but their browser is still open) or simply to gather information about the victim\u2019s habits.<\/p>\n<p>The information about running browsers is written to a log file on the local host.<\/p>\n<div id=\"attachment_119918\" style=\"width: 778px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190414\/Cloud-Atlas22.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119918\" class=\"size-full wp-image-119918\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190414\/Cloud-Atlas22.png\" alt=\"Fragment of the deobfuscated script\" width=\"768\" height=\"271\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190414\/Cloud-Atlas22.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190414\/Cloud-Atlas22-300x106.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/21190414\/Cloud-Atlas22-740x261.png 740w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\"><\/a><\/p>\n<p id=\"caption-attachment-119918\" class=\"wp-caption-text\">Fragment of the deobfuscated script<\/p>\n<\/div>\n<h2 id=\"victims\">Victims<\/h2>\n<p>According to our telemetry, in late 2025 and early 2026, the identified targets of the described malicious activities are located in Russia and Belarus. The targeted industries mostly include government agencies and diplomatic entities.<\/p>\n<p>We attribute the activity described in this report to the Cloud Atlas APT group with a high degree of confidence. The group used techniques and tools described previously, such as the initial access vector, the Python script for information gathering, and the Tor application for forwarding ports to the Tor network. The victim profile and geography also matches the Cloud Atlas targets.<\/p>\n<p>We couldn\u2019t help but notice some parallels with recent Head Mare activity. The PhantomHeart backdoor (<a href=\"https:\/\/securelist.ru\/head-mare-phantomheart-and-phantomproxylite\/114753\/\" target=\"_blank\" rel=\"noopener\">available in Russian only<\/a>), attributed to Head Mare and used to create an SSH tunnel, was placed in directories actively used by Cloud Atlas:<\/p>\n<ul>\n<li>C:Windowsime<\/li>\n<li>C:WindowsSystem32ime<\/li>\n<li>C:Windowspla<\/li>\n<li>C:Windowsinf<\/li>\n<li>C:Windowsmigration<\/li>\n<li>C:WindowsSystem32timecontrolsvc<\/li>\n<li>C:WindowsSKB<\/li>\n<\/ul>\n<p>However, TTPs are still differentiated.<\/p>\n<h2 id=\"conclusion\">Conclusion<\/h2>\n<p>For more than ten years, the Cloud Atlas group has continued its activities and expanded its arsenal. Over the course of last year, many targeted campaigns in general were found to employ ReverseSocks, SSH and Tor, and the use of these utilities was no exception for Cloud Atlas. Creating such backup control channels using publicly available utilities significantly complicates the complete disruption of attackers\u2019 actions on compromised systems. We will continue to closely monitor the group\u2019s activity and describe their new tools and techniques.<\/p>\n<h2 id=\"indicators-of-compromise\">Indicators of compromise<\/h2>\n<p><strong>PowerCloud<br \/>\n<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/7a95360b7e0eb5b107a3d231abbc541a\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_e698e126b42f5c0c&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">7A95360B7E0EB5B107A3D231ABBC541A<\/a>\u00a0 C:Windowswininet.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/c0d1eaa15a2cefbab9735787575c8d8e\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_c8b468390be1ef7b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">C0D1EAA15A2CEFBAB9735787575C8D8E <\/a>C:WindowsLiveKernelReportsupdate.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/d5b38b252cf212a4a32763de36732d40\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_6427b2bd73c9c78e&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">D5B38B252CF212A4A32763DE36732D40<\/a>\u00a0 \u00a0C:Windowsimeimejpdictsi39884.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/3c75cedb1196df5eab91f31411ed4b33\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_d6e2eec89f382fd4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">3C75CEDB1196DF5EAB91F31411ED4B33<\/a>\u00a0 C:plareports.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/42ac350bfbc5b4eb0fedba16c81919c7\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_a00eb55f3de2e4d1&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">42AC350BFBC5B4EB0FEDBA16C81919C7<\/a>\u00a0 \u00a0C:ProgramDataupdate_[redacted].exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/493b901d1b33eb577db64aadd948f9ce\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_e49b9a7d632aa71a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">493B901D1B33EB577DB64AADD948F9CE<\/a>\u00a0 C:WindowsmigrationwtrMicrosoftBrowser.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/2cabb721681455dae1b6a26709def453\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_904e91324f3b9b76&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">2CABB721681455DAE1B6A26709DEF453<\/a>\u00a0 C:Windowsplareportswinlog.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/1b39e86eb772a0e40060b672b7f574f1\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_e2b1ce26fbae7871&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">1B39E86EB772A0E40060B672B7F574F1<\/a> C:WindowsSystem32timecontrolsvcvmnetdrv64.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/1d401d6e6fc0b00aaa2c65a0ac0cfd6b\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_2ce5008f78c558ca&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">1D401D6E6FC0B00AAA2C65A0AC0CFD6B<\/a> C:Windowssetupscriptsinstallsoftwareactivationaactdfsvc.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/40a562b8600f843b717bc5951b2e3c29\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_e0aa43d9bded7f00&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">40A562B8600F843B717BC5951B2E3C29<\/a>\u00a0 C:Windowsbrandingscat.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/f721a76deb28fd0b80d27fce6b8f5016\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_867ddd7b22bd2f44&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">F721A76DEB28FD0B80D27FCE6B8F5016<\/a>\u00a0 C:Windowsimeimekrdictsdfsvc.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/d3c8afd22baa306ff659db1fac28574a\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_7da0aaa4b584be73&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">D3C8AFD22BAA306FF659DB1FAC28574A<\/a>\u00a0 C:ProgramDataupdate_[redacted].exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/6d7b2d1172bbdb7340972d844f6f0717\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_3f389c64500d1f0c&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">6D7B2D1172BBDB7340972D844F6F0717<\/a> C:Users[redacted]AppDataLocal1c1cv81cv8ud.exe<br \/>\nC:Users[redacted]AppDataLocal1c1cv8svc.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/9769f43b9de8d19e803263267fa6d62e\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_32a7113815c4ad01&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">9769F43B9DE8D19E803263267FA6D62E<\/a> C:Users[redacted]AppDataLocal1c1cv81cv8ud.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/63b6be9ae8d8024a40b200cccb438f1d\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_13f64b53ffc36cf7&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">63B6BE9AE8D8024A40B200CCCB438F1D<\/a>\u00a0 C:Windowsnotepad.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/6aa586bcc45ca2e92a4f0ef47e086fa1\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_2199ef89aaab5e9a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">6AA586BCC45CA2E92A4F0EF47E086FA1<\/a>\u00a0 C:Windowssplwow32.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/eba3bcdb19a7e256bf8e2cc5b9c1cca9\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_8a979b5a07f370c4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">EBA3BCDB19A7E256BF8E2CC5B9C1CCA9<\/a>\u00a0 \u00a0C:Users[redacted]Desktopsocstant.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/b4e183627b7399006c1bc47b3711e419\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_465a9779559aca3f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">B4E183627B7399006C1BC47B3711E419<\/a>\u00a0 C:WINDOWSimeservice.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/f56b31a4b47ad3365b18a7e922fba1a8\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_ad4a05f3edfb9ace&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">F56B31A4B47AD3365B18A7E922FBA1A8<\/a>\u00a0 dfsvc.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/f6f62456fb0fcc396fb654cbed339bc3\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_739311b54dfb6bab&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">F6F62456FB0FCC396FB654CBED339BC3<\/a>\u00a0 \u00a0\u2013<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/25c8ed0511375dca57ef136ac3fa0cca\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_ee4ae6cf70b2c717&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">25C8ED0511375DCA57EF136AC3FA0CCA<\/a>\u00a0 \u00a0C:brandingdwmw.exe<\/p>\n<p><strong>Browser checker<\/strong><\/p>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/5329f7bff9d0d5db28821b86c26d628f\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_14542e8d47cd9212&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">5329F7BFF9D0D5DB28821B86C26D628F<\/a>\u00a0 C:ProgramDatachecker_[redacted].exe<\/p>\n<p><strong>ReverseSocks<\/strong><\/p>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/2b4ba4facf8c299749771a3a4369782e\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_be8795344c14d099&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">2B4BA4FACF8C299749771A3A4369782E<\/a>\u00a0 C:WindowsPLASystembounce.exe<br \/>\nC:Windowsplaprint_status.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/ba9ce06641067742f2afc9691faff1dc\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_f15899c3abd372e8&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">BA9CE06641067742F2AFC9691FAFF1DC <\/a>\u00a0 C:ProgramDatahpclient.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/fb0f8027acf1b1e47e07a63d8812ed50\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_cb9237f831e4b077&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">FB0F8027ACF1B1E47E07A63D8812ED50<\/a>\u00a0 \u00a0C:WindowsSystem32timecontrolsvcvmnetdrv64.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/bbf1fa694122e07635deeac11ad712f8\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_d851ba0f734ae4c8&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">BBF1FA694122E07635DEEAC11AD712F8<\/a>\u00a0 \u00a0C:WindowsSystem32HostManagement.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/f301aa3d62b5095eec4d8e34201a4769\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_06ae7ada7cdd206a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">F301AA3D62B5095EEC4D8E34201A4769<\/a>\u00a0 \u00a0C:Windowsimeimejpmsfu.exe<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/f9c3bbe108566d1a6b070f9c5fb03160\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_22fdbddb35020e08&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">F9C3BBE108566D1A6B070F9C5FB03160<\/a>\u00a0 \u00a0C:WindowsimeimetchelpIMTCEN14.exe<\/p>\n<p><strong>Malicious MS Office documents<\/strong><\/p>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/369b75bdcded16469ede7ab8bedcfae1\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_f681bbc2355e8ac5&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">369B75BDCDED16469EDE7AB8BEDCFAE1<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/9eaae9491f6a50d6df0be393734a44cb\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_df98ece8efbfd095&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">9EAAE9491F6A50D6DF0BE393734A44CB<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/3e6e9df00a764b348ec611ee8504aca0\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_36f2457c80552d47&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">3E6E9DF00A764B348EC611EE8504ACA0<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/9bd788f285e32a05e6591d1eb36ebffc\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_5c5813fbbd582bd9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">9BD788F285E32A05E6591D1EB36EBFFC<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/f42085522ec2ebb16edcf814e7c330ad\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_edec0e4e3b888bd7&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">F42085522EC2EBB16EDCF814E7C330AD<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/2042eb5d52f0b535a1ce6b6f954c8c2b\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_69003cd658ad0a24&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">2042EB5D52F0B535A1CE6B6F954C8C2B<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/2aa1e9765ef6b00b94a9b6be0041436a\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_8c1087404a42b0e4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">2AA1E9765EF6B00B94A9B6BE0041436A<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/36120f5e9411bcbac7104ef3fa964ed2\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_022064c772bc4497&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">36120F5E9411BCBAC7104EF3FA964ED2<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/5000a353399500bc78381dc95b6ed2dc\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_aa36c8e9a2702c13&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">5000A353399500BC78381DC95B6ED2DC<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/579a9952d31cad801a3988dbe7914ce7\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_3afb625c937c2ab9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">579A9952D31CAD801A3988DBE7914CE7<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/867b634588c0fd6b26684d502c15ab03\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_c93e5aba6c083312&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">867B634588C0FD6B26684D502C15AB03<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/38fa4306fa4406ba31cf171af4d36e34\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_00c5268bb3999f59&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">38FA4306FA4406BA31CF171AF4D36E34<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/83edde9f7eeefac0363413972f35572b\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_2ae57c50576740be&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">83EDDE9F7EEEFAC0363413972F35572B<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/cc751619bfec0dc4607c17112b9e3b2c\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_2a045681a8035b87&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">CC751619BFEC0DC4607C17112B9E3B2C<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/a632858f14b36f03d0f213f5f5d6bff2\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_40e5cd8cc6f0444d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">A632858F14B36F03D0F213F5F5D6BFF2<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/097ca205ad9e3b72018750280904718c\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_4fd5fe1a7f5db567&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">097CA205AD9E3B72018750280904718C<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/69121c36eb8bf77962dca825fcffd873\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_98deb3e6be9915e0&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">69121C36EB8BF77962DCA825FCFFD873<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/c5702eb250f855c8c872fffb9bb656ed\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_558875ff6df3feec&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">C5702EB250F855C8C872FFFB9BB656ED<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/ed34f5a136fba4fdea976570faa33ed7\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_1533b20c782c8b08&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">ED34F5A136FBA4FDEA976570FAA33ED7<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/0577db70844e88b32b954906e2f20798\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_39dfb2e594af437a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">0577DB70844E88B32B954906E2F20798<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/28ecf8fb6719e14231b94b4d37629b0e\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_5eea7c0da1f1c2c5&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">28ECF8FB6719E14231B94B4D37629B0E<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/0857c84b62289a1a9f29e19244e9a499\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_af9847336d87aa47&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">0857C84B62289A1A9F29E19244E9A499<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/0c514e137860f489e3801213460ef938\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_ae05ceed78374db5&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">0C514E137860F489E3801213460EF938<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/50568b1f9335a7e3ba4e5df035a8fb86\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_35a25e3e757f3072&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">50568B1F9335A7E3BA4E5DF035A8FB86<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/7f776ad200287d6de14a29158c457179\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_e4401bd95e667b70&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=S\" target=\"_blank\" rel=\"noopener\">7F776AD200287D6DE14A29158C457179<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/51f7f794ed43fb90d0f8ebbb5effe628\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_c2162a76b39e5a5a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">51F7F794ED43FB90D0F8EBBB5EFFE628<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/b8c753dd254509fba5077ffd5067eab0\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_dabb183564d933c5&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">B8C753DD254509FBA5077FFD5067EAB0<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/bc3739dec8cd8f54f3f60a85f3ed600e\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_6672222628918fd9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">BC3739DEC8CD8F54F3F60A85F3ED600E<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/ec076cd21c483a40156f4e40d08daded\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_b5879a832981af17&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">EC076CD21C483A40156F4E40D08DADED<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/216cb7f31d383c0dd892b284df05a495\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_afef8f1881a223c2&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">216CB7F31D383C0DD892B284DF05A495<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/116f59e70a9df97f4adaea71eecb1e9a\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_34885e20056cfd7a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">116F59E70A9DF97F4ADAEA71EECB1E9A<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/7242ac065b50bcde9308756b49dbadcb\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_5b64089bd6857c19&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">7242AC065B50BCDE9308756B49DBADCB<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/8158552950d2e13b075001ce0c52aa97\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_12767d3fea69b427&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">8158552950D2E13B075001CE0C52AA97<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/a75dbed984963b9ab21309c5b2f8fd9b\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_35268f3c5d142024&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">A75DBED984963B9AB21309C5B2F8FD9B<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/0320dd389fdbab25d46792bd2817675e\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_fb597e73e7cbd286&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">0320DD389FDBAB25D46792BD2817675E<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/5339d1a666f3e40fe756505cf1d87d4b\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_67c9341f8f0f8228&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">5339D1A666F3E40FE756505CF1D87D4B<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/67d7e3aeeb673bf60c59361c12a4ed81\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_7e3873499a95926d&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">67D7E3AEEB673BF60C59361C12A4ED81<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/89572f0ed20791a5ac9fc4267d67ccb0\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_b8341327f5524a4f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">89572F0ED20791A5AC9FC4267D67CCB0<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/b6aae073e7bfebf4d643c2bbeb5c02e1\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_650b0b6d4ce93beb&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">B6AAE073E7BFEBF4D643C2BBEB5C02E1<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/344ca9ea07cd4ac90ef27f8890d4ec05\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_58c8027aa2ad33df&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">344CA9EA07CD4AC90EF27F8890D4EC05<\/a><\/p>\n<h3><strong>Domains and IPs<\/strong><\/h3>\n<p><strong>Reverse SSH\/Socks domains<\/strong><\/p>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/tenkoff.org\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_3265a140e3ecb86b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">tenkoff[.]org<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/cloudguide.in\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_ab1525fee993f876&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">cloudguide[.]in<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/goverru.com\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_e8311f189e8ee368&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">goverru[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/kufar.org\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_243f846129f2d966&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">kufar[.]org<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/ultimatecore.net\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_cd496469caa81ecd&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">ultimatecore[.]net<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/spbnews.net\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_ea55de1d304c76e3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">spbnews[.]net<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/onedrivesupport.net\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_efc93cab9964519f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">onedrivesupport[.]net<\/a><\/p>\n<p><strong>Malicious and compromised domains used in MS Office documents<\/strong><\/p>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/amerikastaj.com\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_7568fde7a0e9fbe9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">amerikastaj[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/bigbang.me\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_83cbe7daf18e8203&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">bigbang[.]me<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/paleturquoise-dragonfly-364512.hostingersite.com\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_85649fdce3547bae&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">paleturquoise-dragonfly-364512.hostingersite[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/wizzifi.com\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_59aa83ee1953ea2e&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">wizzifi[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/totallegacy.org\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_4367fdf767d2bee4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">totallegacy[.]org<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/mamurjor.com\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_2c9879a287181d8a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">mamurjor[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/landscapeuganda.com\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_a95f743331093de2&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">landscapeuganda[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/lafortunaitalian.co.uk\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_98ee183cee06dc94&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">lafortunaitalian.co[.]uk<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/kommando.live\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_d52440750e5444b9&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">kommando[.]live<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/internationalcommoditiesllc.com\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_8c467a42e51015f4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">internationalcommoditiesllc[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/humanitas.si\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_58de73502c013b17&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">humanitas[.]si<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/fishingflytackle.com\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_d95d4d9ad1086d51&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">fishingflytackle[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/firsai.tipshub.net\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_5c32ac2f842a319e&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">firsai.tipshub[.]net<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/alnakhlah.com.sa\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_e3abc92d4f709e8b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">alnakhlah.com[.]sa<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/allgoodsdirect.com.au\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_6de0fe39f691d5a3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">allgoodsdirect.com[.]au<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/agenciakharis.com.br\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_e49d89d844b350dd&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">agenciakharis.com[.]br<\/a><\/p>\n<p><strong>Powershell payload staging<\/strong><\/p>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/istochnik.org\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_2fa803d3d97ca495&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">istochnik[.]org<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/iznews.net\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_456892575930684e&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">znews[.]net<\/a>i<br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/investika-club.com\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_98b87ccc2e9e978b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">investika-club[.]com<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/194.102.104.207\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_6545cc7f43f82694&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">194.102.104[.]207<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/46.17.45.56\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_b727817532740347&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">46.17.45[.]56<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/46.17.45.49\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_cc3ea446e9180cb3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">46.17.45[.]49<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/46.17.44.125\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_9d17c69e5a7f7e61&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">46.17.44[.]125<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/46.17.44.212\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_f2c7bc298f4e0324&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">46.17.44[.]212<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/46.17.44.212\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_f2c7bc298f4e0324&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">185.22.154[.]73<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/194.87.196.163\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_2d7a35e6525775bb&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">194.87.196[.]163<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/195.58.49.9\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_e3f7979c16617877&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">195.58.49[.]9<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/93.125.114.193\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_98ad150bcf97515a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">93.125.114[.]193<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/93.125.114.57\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_35f512065585bf39&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">93.125.114[.]57<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/45.87.219.116\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_5631643cf546d0c4&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">45.87.219[.]116<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/37.228.129.224\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_6eebf535a48d7a8b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">37.228.129[.]224<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/185.53.179.136\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_3ede27388d668c98&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">185.53.179[.]136<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/185.126.239.77\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_ca217edaa9335e21&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">185.126.239[.]77<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/5.181.21.75\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_4f980c686d792228&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">5.181.21[.]75<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/146.70.53.171\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_482c2a9c338894c2&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">146.70.53[.]171<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/45.15.65.134\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_170852c348404f8b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">45.15.65[.]134<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/185.250.181.207\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_94ee885c83ceb09a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">185.250.181[.]207<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/81.30.105.71\/results?tab=lookup&amp;icid=gl_sl_post-opentip_sm-team_104ff8648418e54a&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">81.30.105[.]71<\/a><\/p>\n<h3><strong>File paths<\/strong><\/h3>\n<p><strong>VBS scripts<\/strong><\/p>\n<p>WriteToSchedulerKillSSH.vbs<br \/>\nCreate_task_day.vbs<br \/>\nWriteToSchedulerGenerateKey.vbs<br \/>\nC:WindowsINFRun.vbs<br \/>\nc:WindowsINFinstall.vbs<br \/>\nUpdate.vbs<br \/>\nc:WindowsPLASystemGen.vbs<br \/>\nC:WindowsINFGenK.vbs<br \/>\nc:WindowsPLASystemKill.vbs<br \/>\nc:WindowsPLASystemRun.vbs<\/p>\n<p><strong>ssh.exe<\/strong><\/p>\n<p>c:WindowsimeimejpAsset.exe<br \/>\nc:WindowsPLASystemconhosts.exe<br \/>\nc:WindowsINFBITSesentprf.exe<br \/>\nc:WindowsINFMSDTCRuntimeBrokers.exe<br \/>\nc:Windowsinfdiagnostic.exe<\/p>\n<p><strong>ReverseSocks<\/strong><\/p>\n<p>C:WindowsPLASystembounce.exe<br \/>\nC:ProgramDatahpclient.exe<br \/>\nC:WindowsSystem32timecontrolsvcvmnetdrv64.exe<\/p>\n<p><strong>Tor client<\/strong><\/p>\n<p>C:WindowsResourcesUpdateIntel.exe<br \/>\nC:WindowsINFpackage.exe<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In 2025, we observed pervasive SSH tunnel activity, which has remained active into 2026, affecting many government organizations and commercial companies in Russia and Belarus. Behind some of this activity is Cloud Atlas, a group we have known since 2014. During our investigation, we identified new tools used by this group, as well as indicators [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[251,256,247,270,271,90,232,233,259,94,252,1190,249,257],"tags":[91],"class_list":["post-3297","post","type-post","status-publish","format-standard","hentry","category-apt","category-apt-targeted-attacks","category-apt-reports","category-backdoor","category-cloud-atlas","category-cybersecurity","category-malware-descriptions","category-malware-technologies","category-microsoft-windows","category-phishing","category-powershell","category-ssh","category-targeted-attacks","category-windows-malware","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"In 2025, we observed pervasive SSH tunnel activity, which has remained active into 2026, affecting many government organizations and commercial companies in Russia and Belarus. Behind some of this activity is Cloud Atlas, a group we have known since 2014. During our investigation, we identified new tools used by this group, as well as indicators [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-22T10:01:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload\",\"datePublished\":\"2026-05-22T10:01:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/\"},\"wordCount\":2690,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"APT\",\"APT (Targeted attacks)\",\"APT reports\",\"Backdoor\",\"Cloud Atlas\",\"Cybersecurity\",\"Malware descriptions\",\"Malware Technologies\",\"Microsoft Windows\",\"Phishing\",\"PowerShell\",\"SSH\",\"Targeted attacks\",\"Windows malware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/\",\"name\":\"Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg\",\"datePublished\":\"2026-05-22T10:01:17+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload - Imperative Business Ventures Limited","og_description":"In 2025, we observed pervasive SSH tunnel activity, which has remained active into 2026, affecting many government organizations and commercial companies in Russia and Belarus. Behind some of this activity is Cloud Atlas, a group we have known since 2014. During our investigation, we identified new tools used by this group, as well as indicators [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-05-22T10:01:17+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload","datePublished":"2026-05-22T10:01:17+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/"},"wordCount":2690,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg","keywords":["Cybersecurity"],"articleSection":["APT","APT (Targeted attacks)","APT reports","Backdoor","Cloud Atlas","Cybersecurity","Malware descriptions","Malware Technologies","Microsoft Windows","Phishing","PowerShell","SSH","Targeted attacks","Windows malware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/","name":"Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg","datePublished":"2026-05-22T10:01:17+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/22085059\/cloud-atlas-2026-scaled-1-990x400.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/cloud-atlas-activity-in-the-second-half-of-2025-and-early-2026-new-tools-and-a-new-payload\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Cloud Atlas activity in the second half of 2025 and early 2026: new tools and a new payload"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/3297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=3297"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/3297\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=3297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=3297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=3297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}