NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是一个新的Windows后门程序NANOREMOTE,它利用Google Drive API进行命令和控制。这个恶意软件与另一个叫FINALDRAFT的有代码相似之处,两者都属于威胁集群REF7707。攻击目标包括政府、国防、电信等机构,主要在东南亚和南美活动。NANOREMOTE的功能包括侦察、执行文件、文件传输等,使用了特定的加密方式。 接下来,我需要把这些要点浓缩到100字以内。确保涵盖恶意软件名称、功能、C2机制、威胁集群以及攻击目标。同时,语言要简洁明了。 可能会遇到的问题是如何在有限的字数内全面覆盖所有关键点。可能需要省略一些技术细节,比如具体的加密方法或攻击链中的细节。 最后,检查一下是否符合用户的要求:中文总结,不超过100字,没有特定开头。 </think> 研究人员披露了一种名为NANOREMOTE的新Windows后门程序,其利用Google Drive API进行命令与控制操作。该恶意软件与FINALDRAFT(又称Squidoor)存在代码相似性,并被归因于威胁集群REF7707(又称CL-STA-0049、Earth Alux和Jewelbug)。该集群针对东南亚和南美的政府、国防、电信、教育和航空等行业实施攻击。NANOREMOTE具备侦察、执行文件和命令以及通过Google Drive API传输文件等功能,并使用特定加密方式与C2服务器通信。 2025-12-11 13:16:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Cyber Espionage / Windows Security

Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for command-and-control (C2) purposes.

According to a report from Elastic Security Labs, the malware shares code similarities with another implant codenamed FINALDRAFT (aka Squidoor) that employs Microsoft Graph API for C2. FINALDRAFT is attributed to a threat cluster known as REF7707 (aka CL-STA-0049, Earth Alux, and Jewelbug).

"One of the malware's primary features is centered around shipping data back and forth from the victim endpoint using the Google Drive API," Daniel Stepanic, principal security researcher at Elastic Security Labs, said.

Cybersecurity

"This feature ends up providing a channel for data theft and payload staging that is difficult for detection. The malware includes a task management system used for file transfer capabilities that include queuing download/upload tasks, pausing/resuming file transfers, canceling file transfers, and generating refresh tokens."

REF7707 is believed to be a suspected Chinese activity cluster that has targeted governments, defense, telecommunication, education, and aviation sectors in Southeast Asia and South America as far back as March 2023, per Palo Alto Networks Unit 42. In October 2025, Broadcom-owned Symantec attributed the hacking group to a five-month-long intrusion targeting a Russian IT service provider.

The exact initial access vector used to deliver NANOREMOTE is currently not known. However, the observed attack chain includes a loader named WMLOADER that mimics a Bitdefender's crash handling component ("BDReinit.exe") and decrypts shellcode responsible for launching the backdoor.

Written in C++, NANOREMOTE is equipped to perform reconnaissance, execute files and commands, and transfer files to and from victim environments using the Google Drive API. It's also preconfigured to communicate with a hard-coded, non-routable IP address over HTTP to process requests sent by the operator and send the response back.

"These requests occur over HTTP where the JSON data is submitted through POST requests that are Zlib compressed and encrypted with AES-CBC using a 16-byte key (558bec83ec40535657833d7440001c00)," Elastic said. "The URI for all requests use /api/client with User-Agent (NanoRemote/1.0)."

Cybersecurity

Its primary functionality is realized through a set of 22 command handlers that allow it to collect host information, carry out file and directory operations, run portable executable (PE) files already present on disk, clear cache, download/upload files to Google Drive, pause/resume/cancel data transfers, and terminate itself.

Elastic said it identified an artifact ("wmsetup.log") uploaded to VirusTotal from the Philippines on October 3, 2025, that's capable of being decrypted by WMLOADER with the same 16-byte key to reveal a FINALDRAFT implant, indicating that the two malware families are likely the work of the same threat actor. It's unclear as to why the same hard-coded key is being used across both of them.

"Our hypothesis is that WMLOADER uses the same hard-coded key due to being part of the same build/development process that allows it to work with various payloads," Stepanic said. "This appears to be another strong signal suggesting a shared codebase and development environment between FINALDRAFT and NANOREMOTE."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/12/nanoremote-malware-uses-google-drive.html
如有侵权请联系:admin#unsafe.sh